Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
What We Have Learned about Terrorism since 9/11
Khusrav Gaibulloev Department of Economics
American University of Sharjah, UAE [email protected]
Todd Sandler* Department of Economics
School of Economic, Political & Policy Sciences University of Texas at Dallas Richardson, TX 75080 USA
Journal of Economic Literature, June 2019, 57 (2), 275-328
This overview piece examines critically the post-9/11 empirical literature on terrorism. Major
contributions by both economists and political scientists are included. We focus on five main
themes: the changing nature of terrorism, the organization of terrorist groups, the effectiveness
of counterterrorism policies, modern drivers or causes of terrorism, and the economic
consequences of terrorism. In so doing, we investigate a host of questions that include: How
terrorist groups attract and retain members? What determines the survival of terrorist groups? Is
poverty a root cause of terrorism? What counterterrorism measures work best? In the latter
regard, we find that many counterterrorism policies have unintended negative consequences
owing to attack transference and terrorist backlash. This suggests the need for novel policies
such as service provision to counter some terrorist groups’ efforts to provide such services.
Despite terrorists’ concerted efforts to damage targeted countries’ economies, the empirical
literature shows that terrorism has had little or no consequences on economic growth or GDP
except in small terrorism-plagued countries. At the sectoral level, terrorism can adversely affect
tourism and foreign direct investment, but these effects are rather transient and create
transference of activities to other sectors, thus cushioning the consequences.
*While assuming full responsibilities for the paper, the authors gratefully acknowledge helpful
comments from Steven Durlauf and three anonymous referees on earlier versions.
What We Have Learned about Terrorism since 9/11
1. Introduction
The unprecedented four hijackings on September 11, 2001 (henceforth, 9/11) killed almost 3,000
people and injured over twice that number. These hijackings profoundly affected security
throughout the world and marked a watershed terrorist event. The deaths tied to 9/11 equaled
those from all transnational terrorist attacks from the start of 1988 through the end of 2000
(Sandler 2003). In addition, 9/11 gave rise to civil freedoms being traded away for security (see,
e.g., Davis and Silver 2004 and Viscusi and Zeckhauser 2003), large-scale (short-run) losses to
global stock exchanges, and significant reallocations of resources to counterterrorism measures
(Chen and Siems 2004 and Sandler, Arce, and Enders 2009). During October 2001, the Bush
administration launched a War on Terror that involved US allies and that primarily focused on
Africa, the Middle East, and Asia. These proactive measures, combined with actions to limit
terrorist financing, initially stressed al-Qaida and its loose network of affiliated groups (Sageman
2004, 2008). However, within a relatively short time frame, terrorist groups developed new
sources of funding (e.g., ransom payments from kidnappings)1 and exploited other means for
transferring funds (e.g., the Hawala system or money transfers through bank balances).
Subsequent terrorist bombings in the United Kingdom, Indonesia, Morocco, the Netherlands,
Saudi Arabia, Spain, Tunisia, Turkey, and elsewhere made the world acutely aware of the
mounting terrorist threat.
Following 9/11, the US government also channeled tens of billions of dollars into the
newly created Department of Homeland Security (DHS), whose budget increased by almost 9%
annually when averaged from 2003 to 2011 in nominal terms (Enders and Sandler 2012, pp. 328-
9). In more recent years, this increase is much more modest, (DHS 2016, p. 8). Other industrial
1 Brandt, George, and Sandler (2016) indicate some recent levels of these ransom payments.
2
countries also increased their security at home following 9/11, because their interests were also
targeted by the same religious fundamentalist terrorist organizations. The rise of al-Qaida in the
Maghreb (AQIM), al-Qaida in the Arabian Peninsula (AQAP), al-Shabaab, al-Qaida in Iraq,
Lashkar-e-Taiba, and the Islamic State of Iraq and Syria (ISIS) presents a dire threat to people
worldwide as these Islamic extremist groups exploit modern technology for propaganda purposes
and to radicalize followers. ISIS poses a particularly poignant threat as underscored by recent
high-profile attacks: suicide bombings, armed attacks, and truck rammings in Paris, Brussels,
Nice, Stockholm, London, and elsewhere.
With a few notable exceptions,2 economists took little research interest in applying
theoretical and empirical tools to study terrorism prior to 9/11. Most academic interest in
terrorism was displayed by political scientists, sociologists, and psychologists before 9/11.
These disciplines primarily contributed historical and descriptive studies on terrorism,
counterterrorism, and terrorist groups. After 9/11, the terrorism literature changed drastically.
Economists took a greater interest and applied econometric methods to analyze whether
terrorism has had significant consequences on macroeconomic aggregates, such as growth,
income, and investment. This is an essential issue because today’s terrorists are intent to damage
targeted countries’ economies, including key sectors such as tourism and foreign direct
investment (FDI) (Sageman 2008).3 Economists also examined the effectiveness of
counterterrorism policy and the root causes of terrorism.4 After 9/11, political scientists changed
2 A notable exception includes Landes (1978), who applies Gary Becker’s economic theory of crime to investigate the effectiveness of metal detectors, sky marshals, and other deterrents on US skyjackings, based on FAA data for 1961–1976. 3 Drakos and Kutan (2003), Enders, Sandler, and Parise (1992), and Sloboda (2003) are a few articles that examine the influence of terrorism on tourism. The relationship between terrorism and trade is investigated by Blomberg and Hess (2006) and Nitsch and Schumacher (2004), whereas the adverse impact of terrorism on FDI is studied by Abadie and Gardeazabal (2008) and Enders and Sandler (1996). 4For example, see Berman (2000, 2009), Berman and Laitin (2008), Enders, Hoover, and Sandler (2016), Krueger (2007, 2008), Krueger and Malečková (2003), and Kunreuther and Heal (2003).
3
their terrorism focus away from descriptive analyses to greater application of rational choice
models and econometric estimation.5 In the post-9/11 study of terrorism, the lines between
economics and political science became blurred, in which economists accounted for the
importance of institutions, politics, and context in their terrorism analyses, while political
scientists applied economic methods to their terrorism investigations.
Terrorism remains a very active field of research as terrorism continues to capture
headlines through its horrific attacks visited on the general public. The post-9/11 literature
contributes answers to the following questions: How has terrorism changed over the last half
century? How do terrorist groups attract and retain members? What determines the survival of
terrorist groups? What counterterrorism measures work best against terrorism? Should new
counterterrorism approaches be devised? Is poverty a root cause of terrorism? Have terrorists
had the damaging influence on targeted economies as intended? Many of these questions were
raised by the media or government leaders after 9/11 as a means of discovering a way forward to
address terrorism.
The primary purpose of this paper is to evaluate critically the post-9/11 empirical
literature on the political economy of terrorism. To keep our evaluation manageable and
focused, we consider five primary issues: (i) the evolving nature of terrorism, (ii) the role of
terrorist groups, (iii) the effectiveness of counterterrorism policies, (iv) some root causes of
terrorism, and (v) the economic consequences of terrorism. In so doing, we provide specific
answers to the questions raised above.
There are five general themes or insights that guide our analysis of these primary issues.
First, terrorism has altered in form after the rising dominance of religious fundamentalist 5For example, Bueno de Mesquita (2013), Carter (2010, 2015a, 2016), and Findley and Young (2012) explore the relationship between terrorism and insurgencies, while Benmelech, Berrebi, and Klor (2012), Dreher and Fischer (2010), Kurrild-Klitgaard, Justesen, and Klemmensen (2006), Li (2005), and Piazza (2008, 2011) investigate causes of terrorism.
4
terrorism in the 1990s and the augmented security measures in the West after 9/11. These
considerations have changed the lethality, location, and nature of terrorism over time, giving rise
to the need for new counterterrorism strategies. Second, terrorist groups respond rationally to
their environment to ensure their survivability and visibility. In so doing, they adopt novel
institutional forms and adjust their attack portfolios in response to counterterrorism actions.
Third, counterterrorism policies have had mixed success. Targeted governments often work at
cross-purposes relying too much on attack-deflecting defensive measures and too little on
proactive offensive measures, especially when the same terrorist group targets multiple
countries. Frequently, well-intentioned counterterrorism policies may have unintended
consequences as terrorists or governments strategically react to one another’s actions. More
thought needs to be given to countermeasures that offset terrorists’ actions, such as service
provision, that win them a constituency. Fourth, terrorism has myriad causes. The alleged
relationships between terrorism and globalization, terrorism and poverty, and terrorism and
regime type are much more nuanced than believed after 9/11. Fifth, as a general rule, terrorism
has had little direct negative impact on the economic growth or GDP of targeted industrial
countries despite some large-scale attacks.6 Any impact is felt by a few terrorism-fragile sectors,
and this impact is transitory and small relative to the economy. Larger macroeconomic effects
may plague small terrorism-ridden countries. Throughout our analysis, the underlying
theoretical framework is rational choice and strategic rational choice (or game theory).
The remainder of the paper contains seven sections. Section 2 offers some background
preliminaries, along with an empirical overview of terrorism since 1968. In Section 3, terrorist
groups’ goals, recruitment, longevity, organizational structure, and effectiveness are analyzed.
Section 4 presents some relevant game-theoretic notions that inform some post-9/11 empirical
6 There is, of course, an indirect effect on security expenditures, some of which may augment GDP.
5
studies of terrorism. The effectiveness of counterterrorism policies is taken up in Section 5,
followed by some select hypothesized causes and facilitators of terrorism in Section 6.
Macroeconomic and sectoral consequences of terrorism are analyzed in Section 7. Concluding
remarks are presented in Section 8.
2. The Evolving Threat of Terrorism since 1968
To address this issue, we must first be clear on a few definitions. Terrorism is the premeditated
use or threat to use violence against noncombatants by individuals or subnational groups to
obtain a political objective through the intimidation of a large audience beyond that of the
immediate victims (Enders and Sandler 2012, p. 4). This definition underlies the terrorist event
datasets, from which we draw our data for the subsequent graphs and tables. In the above
definition, there are two essential ingredients: the presence or threat of violence and a political
motive. Without such a motive, the violent act is a crime but not terrorism. Terrorist
perpetrators apply their violence in the hopes of cajoling a targeted government to concede to
their political demands. By making their acts appear to be random, the terrorists broaden their
audience way beyond the unfortunate victims to create an atmosphere of general anxiety. This
anxiety is meant to induce a country’s constituency (i.e., the audience) to apply pressures on the
government to concede to terrorist demands in order to restore safety. In other instances, the
terrorists seek a liberal democracy’s overreaction that undermines its legitimacy (Hoffman 2006
and Wilkinson 2001). Owing to the perpetrator’s subnational nature, standard terrorism
definitions rule out state terror, but do not rule out state-sponsored terrorism in which a state aids
a terrorist group with intelligence, logistical support, a safe haven, or resources.
Terrorism comes in two varieties that are germane to our study. Domestic terrorism is
homegrown and home directed, for which the victims and perpetrators are citizens of the venue
6
country, where the attack occurs. For instance, the bombing of the Alfred P. Murrah Federal
Building in Oklahoma City by Timothy McVeigh, an American, was an act of domestic
terrorism on April 19, 1995. Theodore Kaczynski’s, the Unabomber, package bombing
campaign on universities and airline companies during 1978–1995 was domestic terrorism. By
contrast, transnational terrorism involves two or more countries owing to the nationalities of the
victims and perpetrators, or the venue country sustaining the attack. If a terrorist incident
commences in one country but concludes in another, then it is a transnational terrorist event, as is
true for some hijackings, letter bombings, and assassinations. When the terrorists cross a border
to engage in their attack, the incident is transnational in nature. If one or more of the victims or
perpetrators are not from the venue country (e.g., the hijackings on 9/11), the terrorist attack is
classified as transnational. Transnational terrorist events often result in transnational
externalities as countries’ policies become interdependent. Increased defensive counterterrorism
measures, deployed by the United States and other targeted industrial countries after 9/11 (Bush
2002 and Enders and Sandler 2005a, 2005b), may displace planned terrorist attacks against these
countries to other less secure countries (see Sections 4 and 5). Additionally, US proactive
measures to weaken al-Qaida, an Islamic fundamentalist group engaged in transnational and
domestic terrorist attacks, limit the group’s effectiveness against all potential targeted countries,
thereby conferring a public benefit on such countries (Sandler 2005 and Sandler and Lapan
1988).
Prior to the 1990s, most terrorist groups were left wing or nationalist/separatist
(Blomberg, Engel, and Sawyer 2010, Cronin 2006, Hoffman 2006, and Rapoport 2004). The
rapid rise of the religious fundamentalist terrorist groups started in the 1990s with al-Qaida and
its Islamic extremist affiliated groups (Berman 2009, Gaibulloev and Sandler 2014, Phillips
2014, 2015, and Section 3). Unlike the leftists who generally wanted to limit casualties and
7
collateral damage, the religious fundamentalists wanted to maximize carnage as 9/11 and the
March 11, 2004 Madrid commuter bombings demonstrate. During the 1990s, the religious
fundamentalist assumed a dominant influence among terrorist groups.
[Table 1 near here]
Table 1 is based on Jones and Libicki’s (2008) list of 648 terrorist groups that started
before 2007.7 We list some characteristics of these groups before and after 2001 in the top and
bottom portions of the table. For the two periods, we distinguish groups by their ideology, e.g.,
left-wing indicates an underlying Marxist or socialist ideology, and nationalist denotes
nationalist/separatist groups. By resident country, we indicate two characteristics of the base
country: its income class and regime type. We also present the average annual number of
groups launched during 1968–2000 and 2001–2006. Using 2001 as the dividing line, we can
draw some interesting contrasts between left-wing and religious fundamentalist (denoted by
religious in Table 1) terrorist groups. First, religious fundamentalist terrorist groups represent
the greatest percentage of new groups started after 2001. This trend starts in the beginning of the
1990s; in our sample, 14% (44) of the groups formed before 1990 are religious fundamentalists,
whereas 30% (98) of the groups formed after 1990 are religious fundamentalists. On average, a
slightly higher annual number of leftist and nationalist/separatist groups are created during the
post-2001 period compared to the pre-2001 period. However, the average annual number of
newly-created religious fundamentalist terrorist groups more than tripled during the period after
2001. Second, prior to 2001, leftist groups are heavily represented in middle- and high-income
democracies, while the religious fundamentalist groups are heavily represented in low- and
middle-income autocracies and partly free democracies. Third, after 2001, these relative
distributions of leftist and religious fundamentalist groups remain essentially the same.
7 A more up-to-date list of terrorist groups that is matched to a terrorist event dataset is not currently available.
8
Because we do not have terrorist group data by the type of religion, we examine the
names of 52 religious fundamentalist groups that appeared during 2001–2006 and find that more
than 61% of those names contain words related to Islam. Out of 52 religious extremist groups,
23 emerged in Iraq, following the Iraq invasion, 3 began in Afghanistan, and 6 started in
Pakistan.
[Table 2 near here]
Table 2 displays regional distribution of the base of operations of 586 terrorist groups –
from Jones and Libicki’s list – that formed before 2002 and during 2002–2006. Groups are
distinguished by ideology. Some groups have multiple bases of operation in different regions, so
that the number of observations is greater than 586. We apply the World Bank regional
classifications: South Asia, SA; Europe and Central Asia, ECA; Middle East and North Africa,
MENA; Latin America and the Caribbean, LAC; East Asia and Pacific, EAP; sub-Saharan
Africa, SSA; and North America, NA. Overall, leftist terrorist groups are mostly concentrated in
ECA and LAC. Prior to 2002, nationalist terrorist groups appeared across all regions with large
numbers located in ECA, MENA, SA, and SSA. During 2002–2006, nationalist groups mostly
emerged in ECA and MENA. The religious fundamentalist groups started before 2002 located in
EAP, ECA, MENA, and SA. In the post-2001 period, the new religious fundamentalist groups
are based almost exclusively in MENA and SA. Comparing the base location of terrorist groups
that started before 2002 and during 2002–2006, the share of groups based in ECA and LAC
decreased in the post-2001 period, whereas the share of groups located in MENA and SA
increased in the same period. In particular, this share dropped from 31% to 26% in ECA, but
soared from 18% to 38% in MENA. Given that groups prefer to locate closer to the place of
their attacks (Gaibulloev 2015), this change is expected to raise the share of attacks in MENA.
Next, using the data from RAND (2012) and Jones and Libicki (2008), we track 103
9
terrorist groups that emerged after 2001 – see Table 3. By the end of 2006, almost 44% of the
leftist and nationalist/separatist terrorist groups ceased to exist. In contrast, 70% of the religious
fundamentalist groups remained active in 2007. Leftist terrorist groups in the sample account for
the greatest number of terrorist (domestic and transnational) attacks during 2002–2007.
However, attacks by the religious fundamentalist and nationalist/separatist terrorist groups are far
deadlier. The religious fundamentalist groups increased their activities and accounted for more
casualties (deaths or injuries) after 1993 (Berman and Laitin 2008 and Enders and Sandler 2000).
Unlike the leftists, some Islamic fundamentalist groups employed suicide bombings, which have
much higher death and injury tolls than conventional bombings.8 Sageman (2004, 2008)
attributes the increased lethality of religious fundamentalist terrorists, in part, to a “leaderless
jihad,” for which individuals can become radicalized and pose a homegrown threat that
traditional border protection is powerless to address. The Orlando nightclub massacre by an
American-born terrorist on June 12, 2016 is an example of this leaderless jihad.
[Table 3 and Figure 1 near here]
Figure 1 takes its data from two terrorist event datasets: International Terrorism:
Attributes of Terrorist Events (ITERATE) and the Global Terrorism Database (GTD).9 Both
datasets draw their observations from the news media. ITERATE only records transnational
terrorist incidents for 1968–2016; GTD records domestic and transnational terrorist incidents for
1970–2016. We use Enders, Sandler, and Gaibulloev’s (2011) method for splitting GTD into
domestic and transnational terrorist incidents. For all of our data displays, we rely on ITERATE
for transnational terrorist incidents and GTD for domestic terrorist incidents.
8 On suicide bombings, see Benmelech and Berrebi (2007), Pape (2003, 2005), Rosendorff and Sandler (2010), and Santifort-Jordan and Sandler (2014). A few nationalist/separatist groups – most notably, the Tamil Tigers and the Kurdish Workers Party – use suicide bombings. 9 ITERATE is maintained by Mickolus et al. (2017) and GTD is compiled by National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2017).
10
In Figure 1, the number of transnational terrorist incidents is measured on the left-hand
vertical axis, while the number of domestic incidents is measured on the right-hand vertical axis.
The units on the right axis are quite compressed because domestic terrorist incidents outnumber
their transnational counterpart, depending on the time period. Transnational terrorism displays a
marked decline starting in 1994 as the religious fundamentalist groups grew in their dominance.
Following the end of the Cold War, some important European leftist terrorist groups
disappeared. Also the start of the 1990s witnessed much less state-sponsorship of terrorism
(Enders and Sandler 1999 and Hoffman 2006). In Figure 1, domestic terrorism far exceeds
transnational terrorism since 1977, with the exception of 1993. The one-year displayed decline
in domestic incidents in 1993 is the result of the GTD data for this year falling off of a truck
during a Pinkerton Global Intelligence Services (PGIS) office move.10 Since 2012, there is an
ominous rise in transnational terrorism due, in part, to many new Islamic terrorist groups, such as
ISIS, al-Shabaab, Boko Haram, and others increasing their campaigns of terror. Domestic
terrorism increased during 1975–1992 and 2008–2016. Some of the recent surge is due to more
generous coding of domestic incidents by GTD, especially since 2013 and a change in coders.
[Figures 2 and 3 near here]
Figure 2 presents the number of casualties per terrorist incident. Overall, the casualties
per attack increased for both domestic and transnational terrorism since the 1990s. Although,
there is a decline in the casualties after 2004, the numbers are still higher than those prior to
1990. The average numbers of casualties per transnational incident for the pre- and the post-
1990 periods are 2 and 8, respectively. The average number of casualties per domestic incident
is 3 before 1990 and 7 since 1990. The casualties per transnational terrorist incident continually
exceed the casualties per domestic terrorist incident after 2008.
10 PGIS originally collected GTD, which they gave to START (2017) to update and maintain.
11
In Figure 3, the proportions of transnational and domestic terrorist incidents with
casualties (i.e., deaths or injuries) are displayed. For the entire period, domestic terrorism is
associated with a greater proportion of incidents with casualties than transnational terrorism, but
this difference is closing since 2009. From 1999 on, there is a general upward trend in the
proportion of transnational terrorist incidents with casualties. This finding supports the notion
that the rising dominance of religious fundamentalist terrorism is associated with greater
carnage. Before 1990, on average, 26% of transnational terrorist incidents resulted in casualties,
while, from 1990 on, 46% of transnational terrorist incidents ended in casualties. This same
casualty percentage calculation for domestic terrorism gives 51% before 1990 and 67% for 1990
on. Since the early 1990s, the declining number of transnational terrorist attacks and the rising
carnage per attack strongly suggest that religious fundamentalist terrorists are getting more terror
from each of their attacks.
[Figure 4 near here]
Figure 4 displays the number and proportion of transnational terrorist attacks directed at
US people or property. One must remember that relatively few transnational terrorist attacks
occur on US soil, so that the bulk of these attacks are abroad. Since 2003, Figure 4 shows that
attacks against US interests are way down, given post-9/11 US defensive measures and US
proactive counterterrorism measures in the Middle East, Afghanistan, and the Philippines.
During 1968–2001, 32% of all transnational terrorist attacks were against US interests; during
2002–2016, 27.4% of all transnational terrorist attacks were against US interests. Just 15.3% of
transnational terrorist incidents were directed at US interests during 2013–2016. There is a
marked downward trend in this percentage after 2001, suggesting that counterterrorism measures
have kept US interests somewhat safer at home and abroad.
[Tables 4 and 5 near here]
12
Table 4 breaks down transnational terrorism and resulting casualties by its four major
modes of attacks – bombing, hostage taking, armed attack, and assassination. Bombings include
explosive, incendiary, letter, car, and suicide bombs, while hostage taking includes kidnapping,
skyjacking, barricade and hostage taking, and non-aerial hijacking. Other modes of attacks are
combined into one column under “Others.” As a general rule of thumb, bombings account for
about half of the total number of incidents and represent terrorists’ favorite type of attack. Most
kinds of bombings are logistically simple, requiring few resources. In Table 4, we distinguish
incident types for two periods: 1968–2001 and 2002–2016. In addition, we display the average
annual number of events, which dropped from 358 to 165, or by more than half, after 9/11, and
the average number of casualties per year, which surged from 957 to 1825. Table 5 provides the
same breakdown of incident types and time periods for domestic terrorist events. A noteworthy
feature is the increase in the average annual number of such incidents and casualties in the post-
9/11 period, indicative of a rising threat of domestic terrorism (Gaibulloev, Sandler, and Santifort
2012). For 1970–2001, domestic terrorist attacks outnumbered transnational terrorist attacks by
almost 4 to 1. This ratio is far greater in recent years. Similarly, the annual number of casualties
from domestic incidents greatly exceeds the annual number of transnational attack casualties.
[Figures 5 and 6 near here]
The changing patterns of terrorist modes of attacks before and after 9/11 are captured by
Figures 5 and 6, which display the percentage of transnational and domestic incidents by attack
type, respectively, for 1968–2001 and 2002–2016. For transnational incidents, there is a marked
drop in bombings and a pronounced increase in hostage taking (primarily kidnappings for
ransoms)11 and armed attacks after 9/11. Hostage taking rose as terrorists sought new sources of
11 See Brandt, George, and Sandler (2016), Brandt and Sandler (2009), and Gaibulloev and Sandler (2009a) on the composition of hostage-taking incidents.
13
funding as targeted governments went after terrorist-supporting charities and other means of
terrorist financing (Basile 2004, Bush 2002, and Enders and Sandler 2012). Armed attacks in
public places in major cities grew and, in so doing, allowed religious fundamentalist terrorists to
maximize carnage. A somewhat different picture emerges from domestic terrorist attacks for
these two periods in Figure 6. The proportion of bombings increased slightly after 9/11 and
remained well above 50%. Armed attacks also rose slightly and assassinations dropped as a
proportion of domestic terrorism. There was a noteworthy post-9/11 increase in hostage taking,
again indicative of terrorists seeking alternative funding sources.12
[Figures 7a and 7b near here]
Next, we turn to the pie charts in Figures 7a and 7b that show the changing regional
patterns of transnational terrorism attacks for the pre- and the post-9/11 periods. Following 9/11,
Figures 7a and 7b indicate that the share of transnational terrorist attacks decreased in ECA and
LAC and increased in MENA, SA, and SSA. This is due, in part, to the decline of the share of
leftist terrorists, who were heavily represented in ECA and LAC before 9/11, and the increase in
religious fundamentalist terrorists, who were heavily represented in MENA, SA, and SSA after
9/11. This switch in regional shares is also due to the increased security in NA and ECA after
9/11 and instabilities in MENA. We should also note that failed or weak states tend to be located
in the regions experiencing the post-9/11 increased proportion of transnational terrorist events.13
[Figures 8a and 8b near here]
A somewhat similar regional transition of the share of domestic terrorist attacks in the
pre- and post-9/11 periods is seen in Figures 8a and 8b. In the pre-9/11 era, domestic terrorism
was most concentrated in LAC and ECA; in the post-9/11 era, domestic terrorism was most 12 Some of the reason for the low pre-9/11 hostage-taking percentage is due to GTD undercounting these incidents – PGIS customers’ were foreign corporations that cared little about the abduction of domestic individuals. This undercounting changed once START took over the maintenance of the database. 13 On failed states and terrorism, see George (2018), Lai (2007), and Piazza (2008).
14
prevalent in MENA, SA, and SSA. Except for MENA, the post-9/11 percentages are different
between transnational and domestic terrorism. Many of the likely drivers for the regional
transition of domestic terrorism are the same as those for the regional transition of transnational
terrorism. One different driver concerns the location of civil wars, which can fuel domestic
terrorism (Findley and Young 2012).
We also construct similar figures for the regional distribution of attack casualties, where
the shifting patterns for casualties are similar to those of incidents. For transnational terrorism,
the share of casualties dropped markedly in ECA and LAC and rose in MENA, SA, and SSA for
the period after 9/11 – see Figures 9a and 9b. With regard to domestic terrorism – Figures 10a
and 10b – the share of casualties fell significantly in ECA and LAC and grew sharply in MENA
in the post-9/11 era, which is consistent with Figures 8a and 8b. However, the share of casualties
for domestic terrorist incidents remained constant between the two periods for SA and SSA, even
though both SA and SSA experienced an increase in the absolute number of casualties in the
post-9/11 period. The post-9/11 percentage declined in EAP. These are due to a dramatic
increase in the share of casualties in MENA resulting from recent conflicts and instabilities in the
region; MENA accounts for a half of all domestic incident casualties after the 9/11.
[Figures 9a, 9b, 10a, and 10b near here]
3. Terrorist Groups: Choices, Survival, Organization, and Effectiveness
A terrorist group is a subnational collective, consisting of members, who use terrorism to achieve
a political objective (Phillips 2015). Some terrorist groups – e.g., ISIS, Boko Haram, and
Fuerzas Armadas Revolucionarias de Colombia (FARC) – control territory, while most terrorist
groups – Italian Red Brigades, Direct Action, Black September, and Red Army Faction – do not.
In addition, some terrorist groups use a mix of terrorist and guerrilla attacks, in which the latter
15
are directed at military forces. Terrorist groups are often classified on the basis of four
ideologies: left wing, religious fundamentalist, nationalist/separatist, and right wing (Cronin
2006, Gaibulloev and Sandler 2013, 2014, and Jones and Libicki 2008). Issue-specific groups
are often labeled as left wing – e.g., groups promoting animal rights, groups seeking reduced
economic discrimination, or groups working for an end to the Vietnam War. If a particular
terrorist group adopts a Marxist orientation, then it is placed with the left-wing groups unless its
primary goal is the pursuit of national autonomy – Abu Sayyaf and Popular Front for the
Liberation of Palestine (PFLP) – in which case it is classified as nationalist/separatist. As shown
in Section 2, religious fundamentalist terrorist groups pose an increasing threat in terms of their
growing numbers and the lethality of their operations (see especially Table 3). Within these four
ideological-based terrorist groups, goals can differ greatly. Some groups aim for modest policy
changes, while others seek grandiose political transformations. In the latter case, Jemaah
Islamiyah campaigns for a Pan-Islamic state in Southeast Asia. Other terrorist groups want to
maintain the status quo over a proposed policy change. In numerous instances, terrorist groups
pursue territorial change, especially among nationalist/separatist organizations.
3.1 Terrorism, Insurgency, and Civil War
Prior to analyzing terrorist choices, we must distinguish among three concepts of political
violence. An insurrection is a “politically based uprising intended to overthrow the established
system of governance and to bring about a redistribution of income” (Sandler and Hartley 1995,
p. 307). Unlike terrorism, insurrections involve a large sector of the population that throws its
support behind rebel leaders. By contrast, guerrilla warfare is a tactic that relies on mobile rebel
forces to engage in irregular warfare against larger governmental forces. Like guerrilla warfare,
terrorism is a tactic that may or may not be employed in an insurrection.
16
Civil wars, also known as intrastate wars, consist of an armed conflict between a
sovereign state and organized domestic groups that engage a government’s military forces
(Sambanis 2008). Civil wars must surpass some threshold of deaths, which is not true for
terrorism. Findley and Young (2012) highlight a few specific instances wherein terrorist tactics
were deployed before, during, or after civil wars.14 Although terrorism may be used by rebel
forces, terrorism need not be associated with civil war and most frequently is applied in the
absence of such war – e.g., Italian Red Brigade, 17 November, Euskadi ta Askatasuma (ETA),
and Combatant Communist Cells (CCC) sought political goals without generating or being
involved in a civil war. During civil wars, rebel attacks against government forces are not
counted in terrorist event datasets because attacks against combatants are excluded. When these
attacks are directed against civilians or passive military targets (e.g., the 1983 suicide bombing
of the US Marine barracks in Lebanon) and are intended to influence an audience, the attacks are
considered to be terrorism. Most of the bombings in Afghanistan and Iraq following 9/11 are not
included in the standard event datasets. For 1970–2012, Gaibulloev, Piazza, and Sandler (2017)
indicate that 70% of all terrorist attacks occurred in countries that did not experience a civil
conflict.
Thus, there is a strong practice in the terrorism literature to treat terrorism, insurgencies,
and civil wars as distinct concepts or in isolation. However, the rise of ISIS, Boko Haram, al-
Shabaab, and AQIM, which control territory, means that the choice between guerrilla warfare
and terrorism tactics is relevant for a select number of terrorist groups.15 Consequently, we next
consider this choice along with other more commonly studied terrorist choices.
14 Also see Berman, Shapiro, and Felter (2011), Bueno de Mesquita (2013), Carter (2010, 2015a, 2015b), and Kalyvas and Balcells (2010). 15 According to Jones and Libicki (2008, p. 98) most terrorist groups are not engaged in an insurgency.
17
3.2 Terrorist Group Choices
Given the rise of some territory-controlling terrorist groups, there is increased theoretical and
empirical interest in explaining their choice between conventional war and irregular tactics –
guerrilla warfare and terrorism.16 If this choice is endogenous, then empirical models that treat
civil wars as an independent variable when explaining the determinants of terrorism are likely
misspecified. Bueno de Mesquita (2013) puts forward a two-stage game of this choice involving
a rebel group and a potential population of supporters, where the government is passive and
outside options are exogenous. Moreover, rebels must choose between conventional conflict and
irregular tactics – they cannot engage in both at a given time. Among other interesting results,
he shows that “the use of irregular tactics is highest in societies in which nonviolent opportunity
is at moderate levels, such that mobilization is low, but extremists are still willing to fight”
(Bueno de Mesquita 2013, p. 234). Thus, the use of terrorism and guerrilla tactics may not
necessarily increase monotonically as nonviolent opportunities decline, contrary to conventional
wisdom. We will see in various other places the prevalence of nonlinearities associated with
terrorist behavior.
In an alternative, but somewhat similar exercise, Carter (2016) puts forward a game-
theoretic model in which terrorists choose between guerrilla attacks and terrorism in an effort to
provoke a violent response from the government.17 In the model, the terrorist group goes first
and decides the type of attack, followed by the government’s choice of the forcefulness of its
response. An implication of his model is that the government’s response is likely to be stringent
if it can inflict greater damage on group members than on civilians. The terrorist group’s choice
of attack type depends on how provocative it intends the attack to be. Generally, guerrilla 16 Works on this topic include Berman, Shapiro, and Felter (2011), Carter (2015a, 2015b, 2016), de la Calle and Sánchez Cuenca (2012), Kalyvas and Balcells (2010), and Laitin and Shapiro (2008). 17 On terrorists provoking a violent response, see Arce and Sandler (2007, 2010), Carter (2012), Jacobson and Kaplan (2007), Jaeger and Paserman (2008), Kydd and Walter (2002), and Merari (1993).
18
attacks are anticipated to cause more damages, thereby evoking a greater state response. When
confronting weak states, terrorist groups are more inclined to choose guerrilla tactics because the
concomitant state’s forceful response is less feared. To test his hypotheses, Carter (2016) draws
his data from Terrorism in Western Europe Event Data (TWEED) (Engene 2007). Carter
classifies attacks against passive military targets (e.g., National Guard) and police as guerrilla
warfare and classifies attacks against other targets as terrorism. During the 1950–2004 period of
his study, almost all Western European terrorist groups, with the exception of the Irish
Republican Army (IRA), did not control territory. Moreover, attacks directed at passive military
targets and police are not instances of civil wars or guerrilla warfare in the sense discussed in the
theoretical literature. Since most terrorist event datasets exclude attacks against combatants,
there is a paucity of data that can test the endogenous choice between terrorism and civil wars.
Also, as stated previously, most terrorist groups do not control territory or engage in civil wars.
Another terrorist choice involves resource allocation between legal activities (e.g.,
running for office or engaging in protests) and terrorist attacks. In the literature, this choice is
examined with standard choice-theoretic models (Anderton and Carter 2005, Enders and Sandler
2004, and Frey and Luechinger 2003).18 These articles focus on substitution and income effects
associated with governments’ action to alter the prices of legitimate protest or illegitimate
terrorist attacks. The result of such government-engineered price changes on protests and
terrorism may be ambiguous for normal goods as substitution and income effects oppose one
another. To date, this choice is not studied empirically, primarily because there is no dataset that
tracks terrorist groups’ legitimate activities. The Jones and Libicki (2008) data indicate which
terrorist groups gave up terrorism and joined the political process (see the next subsection), but
this is an all-or-none choice. Terrorist groups’ choice between legitimate and illegitimate
18 Other choice-theoretic articles on this topic include Sandler (2010) and Siqueira and Sandler (2010).
19
activities is certainly worth studying and would limit some of the underlying exogeneity of many
empirical investigations of terrorist groups’ behavior.
A more studied choice of terrorist groups involves their campaign composition among
alternative modes of attacks in reaction to counterterrorism measures. Enders and Sandler
(1993) investigate this choice in terms of a characteristics model of consumption in which
terrorist modes of attack that provide the same characteristics (e.g., ransoms) are substitutes.
When attack modes must be combined to produce a basic commodity or characteristic (e.g., an
atmosphere of public anxiety), these modes are complements. Among other results, these
authors argue that airport metal detectors should result in fewer hijackings but more kidnappings.
Given that these detectors were later deployed in embassies, these detectors are also expected to
reduce terrorist attacks on embassy grounds. These hypotheses are borne out by their empirical
tests (see Section 5). Their study cautions against looking at policy choices in isolation since one
barrier may affect other modes of attack, not initially intended to be affected.
Terrorist groups are more likely to locate in states that are politically unstable or are in
closer proximity to the venues of (planned) attacks (Bapat 2007 and Gaibulloev 2015).19 Failed
and weak states enlarge the pool of likely recruits, create favorable environment for groups to
operate freely, and limit government – domestic and foreign – responses. Venue distance affects
the cost related to supplying terrorist assets from the groups’ home base. In an empirical study,
Gaibulloev (2015) investigates terrorist groups’ locational choice by applying a conditional logit
model with a rich set of controls and some heed paid to endogeneity concerns. He shows that
terrorist groups were more inclined to locate in countries where incumbent terrorist groups
shared a similar ideology to that of the entrant. This was especially true for left-wing terrorist
19 Bapat (2007) also finds that groups choose to locate in a foreign country that is more capable than the target country and has a lower political affinity to the target country.
20
groups. Apparently, a greater number of groups improve their productivity and resourcefulness
through collaboration. Group clustering also forces the resident government to dilute
counterterrorism assets, which bolsters groups’ productivity.
Another terrorist choice involves the venue country. Large-scale efforts to secure borders
following 9/11appears to have transferred attacks away from industrial countries’ soil in North
America and Europe (see Figures 7-10; Enders and Sandler 2006). The transference of attacks
may also concern a terrorist group’s choice of target type as select targets within countries are
fortified. Figure 11 displays the cumulative number of transnational terrorist attacks by the four
target types (i.e., officials, business, private parties, and military) for 1968–2016.20 In the late
1960s and 1970s, terrorists directed most of their attacks against official targets. As these targets
became more protected, terrorist redirected their attacks, in part, to business targets. By the start
of the 1980s, businesses deployed increased protection for their people and property, thereby
leading transnational terrorists to increasingly target private parties as seen in Figure 11. By
1999, cumulative attacks against private civilians surpassed those against officials. Terrorists
display a rational transference of targets with the hardest-to-protect targets becoming the most
vulnerable today (Brandt and Sandler 2012). This is in keeping with our recurring theme that
well-intentioned policies may have undesirable consequences. A similar diagram, not displayed,
applies to domestic attacks with the same sequence of transference, in which target substitution
is much faster as domestic groups learn more quickly from one another (Gaibulloev, Sandler, and
Santifort 2012).
[Figure 11 near here]
3.3 Determinants of Terrorist Groups’ Survival
20 This figure updates one in Brandt and Sandler (2010).
21
Recently, an empirical literature of the duration of terrorist organizations is emerging.21 In an
initial study of groups’ longevity, Jones and Libicki (2008) examine 648 terrorist groups that
were active between 1968 and 2006.22 Blomberg, Engel, and Sawyer (2010) later apply survival
or duration models to ascertain the empirical determinants of terrorist group longevity. Among
their findings, survival in the ensuing period increases as the group ages and its lethality
increases, especially after 1990. This pioneering study suffers from numerous concerns: the sole
reliance on transnational terrorist attacks, the use of targeted countries’ socio-economic
variables, no good measure of the groups’ endpoint, and the absence of tactical controls (e.g.,
groups’ diversity of attacks and their share of transnational attacks).
These particular shortfalls are addressed by Blomberg, Gaibulloev, and Sandler (2011)
and Gaibulloev and Sandler (2013). First these studies provide a theoretic foundation in terms of
a terrorist-choice model among tactics and other considerations. Second, they include both
domestic and transnational terrorist attacks because most terrorist groups engage in both kinds of
attacks. Third, these studies use terrorists’ base-country, socio-economic variables since groups’
survival more likely hinges on conditions where they train and seek refuge. Fourth, measures of
groups’ tactics are included. Fifth, the group data are carefully cleaned to eliminate duplicates
and other concerns (e.g., generic designations). Using continuous- and discrete-time survival
regressions, these studies confirm Jones and Libicki’s findings that religious ideology and group
size are positively associated with terrorist groups’ duration. Greater size improves longevity by
helping terrorist groups stage more successful attacks and endure the loss of leadership.
Terrorist organizations choose large-scale attacks only when they grow sufficiently in size
21 Systematic datasets on terrorist groups were not available until recently. Therefore, earlier studies on survivability of terrorist organizations are mostly qualitative. For example, Cronin (2006) examines survivability of al-Qaida based on historical lessons on evolution and demise of modern terrorist groups. 22 The dataset includes groups that started before 1968 but did not end before 1968. Jones and Libicki (2008) identify the end year of a terrorist group as the year when the group either stops using terrorism or ceases to exist.
22
(Feinstein and Kaplan 2010). Findings also suggest that groups that rely more on transnational
terrorist attacks are more likely to fail, because such attacks put a terrorist group in greater peril
when borders have to be crossed. Furthermore, targeted foreign countries may either retaliate
against terrorists or provide counterterrorism assistance to governments combating the terrorist
group. Finally, a group’s cooperative ties with other terrorist organizations are found to improve
the group’s survival prospects, especially in strong or less democratic states (Phillips 2014).23
Terrorist groups end for a variety of reasons. Some groups exit through political
negotiations and integrate into society, whereas others are defeated through military force.
Understanding what factors lead groups to end in alternative ways is important for effective
counterterrorism policy. Gaibulloev and Sandler (2014) use a competing-risk approach to
distinguish the determinants of three types of endings – internal splintering, forceful elimination,
and joining political process or achieving victory (e.g., achieving some of the goals). Three
important findings emerge. First, religiously motivated terrorist groups are less likely to join the
political process or end victoriously, compared to nationalist/separatist, left-wing, and right-wing
groups. Second, terrorist organizations seeking grandiose goals – i.e., empire, regime change, or
social revolution – and pursuing territorial change are also less likely to end through political
process or victory. Such goals leave very little room for compromise between parties. Third,
having multiple bases of operation reduces the probability of ending by military force or
splintering; eliminating such groups requires collective action by multiple countries, which
seldom occurs. Furthermore, multiple home bases allow for accommodating various viewpoints,
which deters splintering and increases resilience. Some Islamic terrorist groups, such as ISIS
and al-Qaida, possess multiple bases. When Gaibulloev and Sandler (2014) partition the data for
groups starting before and after 1990, the data are too thin for a competing-risk analysis.
23 See, e.g., Gaibulloev and Sandler (2013) and Phillips (2014) for other potential determinants of groups’ longevity.
23
Safe haven and groups’ age are also important. Surprisingly, when a terrorist group is
provided safe haven by a foreign supporter, the likelihood of military defeat increases (Carter
2012). This follows because a host government must balance between its support to terrorists
and the risk of military confrontation with a targeted country. Terrorist groups are at high risk
for ending internally in their infancy; the probability of internal dissolution, however, reduces
significantly as a group lasts for ten years (Carter 2012). Repression may improve groups’
survival prospect in democracies by weakening counterterrorism cooperation from local
communities, expanding popular support and potential recruits, and diminishing a government’s
overall effectiveness in fighting terrorism (Daxecker and Hess 2013). In nondemocracies,
however, repression may worsen groups’ duration insofar as the governments are less
constrained in their efforts to combat terrorism, exercise more control over the media, and are
less concerned about perceived legitimacy of their counterterrorism measures. Daxecker and
Hess (2013) empirically confirm that repression has a negative effect on groups’ demise in
democracies and a positive influence on groups’ failure in nondemocracies. Additionally,
government repression improves the chance of victory for groups in democracies and reduces the
chance of victory in nondemocracies.
Several empirical challenges require attention for the further study of group demise.
First, the quality of data on terrorist groups is a concern. The clandestine nature of terrorism
makes it difficult to collect reliable data on groups, thus raising measurement errors and omitted
variables concerns. Information on groups’ characteristics over time, which are important for
understanding groups’ dynamics, is lacking; e.g., Jones and Libicki’s dataset ends in 2006 and all
group-specific information are time-invariant. Second, additional studies are needed to tackle
causality issues. For example, groups’ size is found to be one of the most robust correlate of
survivability. However, the information on group’s size is based on estimates of a group’s peak
24
size and does not vary over time. The time-invariance of group size does not allow controlling
for fixed effects. In addition, the effect of size on longevity may capture the influences of other
group-specific variables – e.g., group’s financial resources – not available to researchers. These
concerns raise potential endogeneity issues. Third, an expanded dataset on groups, which is
carefully cleaned and merged with an up-to-date terrorist event dataset, is needed. The creation
of the requisite global group dataset that goes to the present day and can be merged with GTD is
a large undertaking. Such data would allow researchers to contrast the changing nature of
terrorist groups before and after 9/11and focus better on Islamic terrorist groups.
3.4 Terrorist Recruitment and Group Organization
During the reign of leftist terrorists in the 1960s, 1970s, and 1980s, groups attracted members
with strongly held political views. These members were prepared to engage in violent acts at
great peril to them for the cause (Crenshaw 1981 and Hoffman 2006). This political-based
membership motivation is still true for left-wing, right-wing, and nationalist/separatist terrorist
groups, but is less descriptive of religious fundamentalist terrorists. Based on interviews and
terrorist profiles, Sageman (2004, 2008) concludes that the latter terrorist groups rely on kinship,
long-term friendships, and worship for recruiting purposes. Such ties are very tight and make it
extremely difficult for the authorities to infiltrate these groups. Additionally, these ties provide a
sense of camaraderie among members that facilitates volunteers for dangerous and even deadly
operations (Wintrobe 2006).
By drawing on the theory of clubs (Cornes and Sandler 1996), the sociology of religion,
and the political science of insurgencies, Berman and Laitin (2008) provide an insightful analysis
on religious terrorist groups’ recruitment, effectiveness, and organization. Their analysis
indicates how Islamic extremist groups limit defections, execute suicide missions, and recruit
25
committed members. Such groups include Hamas, Hezbollah, Muqtada al Sadr’s Mahdi Army,
the Taliban, the Egyptian Muslim Brotherhood, and the Palestinian Muslim Brotherhood. At the
foundation of their theory is the groups’ provision of excludable social services or club goods to
their members and members’ families.
This club model of religious fundamentalist groups is inspired by the work of Iannaccone
(1992), who argue that Christian denominations attempted to limit choices and resources among
their members to obtain their loyalty in exchange for excludable social services. The acceptance
of the religious sects’ mandated prohibitions and sacrifices translates into a “costly signal of
commitment” by their members (Berman and Laitin 2008, p. 1943). By organizational design,
sect members have limited outside opportunities and are isolated from the outside world. With
more stringent prohibitions and sacrifices, these religious groups must offer even larger levels of
club goods to their ever-more dependent members. These club goods serve an essential
recruitment and retention purpose. Berman (2000) extends this club theory to ultra-orthodox
Jews, while Berman (2009) tailors it to radical Islamic terrorist groups. In keeping with
Iannaccone, Berman (2009) also indicates how religious fundamentalist groups induce such
sacrifices from members by sending “their children to religious schools that provide poor
training for employment after graduation” (p. 22).24 In so doing, group members have little or no
economic opportunities outside the club when asked to make the ultimate sacrifice. Members’
religious training also limits outside contact, thus curbing potential leaks prior to an operation.
Berman and Laitin (2008) go on to argue that group solidarity and altruism may motivate
these club members to commit suicide terrorist attacks against hardened target, for which suicide
operations may be the sole means to wreak havoc. In his interview-based analysis of failed
24 This view is more fully developed by the seminal works of Berman (2000), Iannaccone (1992), and Iannaccone and Berman (2006).
26
suicide terrorists, Merari (2004) also characterizes terrorists as altruists, who are not driven by
heavenly rewards, depression, or revenge, contrary to some conventional wisdom.25 The better
equipped is the terrorist group’s adversary, the greater is the group’s need for suicide missions to
penetrate defensive perimeters. A suicide operation provides the added benefit that the
perpetrator of successful missions cannot later offer intelligence on the group. Mission success
is fostered through the commitment of its member operatives, who benefit from group-provided
club goods. As Berman and Laitin point out, suicide missions were deployed against hard
targets during the Second Intifada in Israel, the Iraqi insurgency against Coalition forces, the
Chechen rebellion against Russia, and other hard-target scenarios. Often, but not always, the
targets of these attacks were hardened military or official targets rather than softer civilian ones.
Members’ or operatives’ commitments are stronger for devout individuals with low wages. To
achieve this type of membership, these religious terrorist organizations exclude less religious,
high-wage individuals from their club-provided goods (Berman and Laitin 2008, p. 1952).
These authors maintain that service provision and poor market opportunities allow these
Islamic terrorist groups to motivate their members for effective missions. This leads to two
policy recommendations. First, governments should provide these social services to break these
groups’ monopoly provision. Second, better labor market opportunities are needed to discourage
youths from joining these organizations. In Section 5.4, we briefly discuss empirical support that
these authors provide for some of their hypotheses – e.g., service-providing terrorist groups are
associated with more lethal attacks and suicide attacks are directed at hard targets.
In other situations, terrorist recruitment can be motivated by backlash to harsh
25 Azam (2005) also views suicide terrorists as altruists, making the ultimate sacrifice for the good of future generations.
27
governmental proactive measures leveled against a terrorist group.26 In fact, terrorists seek to
push governments to overreact to a brutal terrorist attack in order to recruit more members
through terrorist supporters’ backlash (Enders and Sandler 2012 and Hoffman 2006). This tactic
applies to all types of terrorist groups. Recruitment increases following successful terrorist
attacks27 or failed, highly visible attacks (e.g., the 1972 Munich Olympics kidnapping and
murder of Israeli athletes by Black September).
A somewhat related recruitment method concerns an “outbidding” strategy among rival
terrorist groups for attracting operatives and constituency support. Bloom (2005, pp. 94-7) view
the ratcheting up of violence among competitive groups to be greater when there are more rival
groups. Suicide terrorist attacks may, in particular, be used for outbidding purposes. To support
her hypothesis, Bloom presents some data plots of terrorist attacks for Hamas, PFLP, Fatah, and
Palestinian Islamic Jihad (PIJ) during 2000–2002 for the Palestinian-Israeli conflict. She also
discusses the rise of the Tamil Tigers over its rival groups in Sri Lanka once the Tigers resorted
to suicide attacks. Bloom’s outbidding hypothesis generated some subsequent empirical tests.
For example, Nemeth (2014) find weak evidence in support of this hypothesis when he examines
domestic terrorist incidents during 1970–1997. Group competition is captured by the inverse of
the Herfindahl-Hirschman Index of market shares. In Nemeth (2014), group competition is
negative and significant, which is consistent with terrorist group free riding rather than
outbidding. When he examines a narrower sample of groups with similar ideologies, and focuses
on the interaction term capturing intergroup competition and society’s acceptance of violence,
there is weak evidence of outbidding. Subsequently, Conrad and Greene (2015) investigate the
severity of attacks rather than the quantity of attacks. Severity increases as terrorists target
26 On backlash, see Arce and Sandler (2010), Dugan and Chenoweth (2012), Rosendorff and Sandler (2004, 2010), and Siqueira and Sandler (2007). 27 See Faria (2003) and Faria and Arce (2005) for a purely theoretical analysis of recruitment in a dynamic model.
28
civilians rather than infrastructure or official targets. Their outbidding evidence is weak with
significance at only the 0.10 level. To date, the most convincing evidence of outbidding is
associated with the micro-level study of the Second Intifada and competition within religious
groups (Hamas and PIJ) and within secular groups (Fatah and PFLP) (Jaeger et al. 2015). These
authors present a multinomial logit choice model where Palestinians indicate their support
among rival factions. There is some evidence that violence increases support within Islamist or
within the secular factions, so that outbidding is ideology specific. Unlike earlier outbidding
articles, Jaeger et al. (2015) provide an identification strategy using district dummies, time
dummies, and district time-varying characteristics.
Since the rise of Islamic extremist terrorism in the 1990s, there have been noteworthy
instances (London, Manchester, Paris, and San Bernardino) of first and second generation
Muslim immigrants attacking domestic targets after undergoing radicalization. Krueger (2008)
examines 63 alleged homegrown Islamic terrorists in the United States. He finds that these
terrorists were younger and better educated than a representative sample of over 1000 Muslim
Americans. Notably, Krueger (2008, p. 295) does not uncover persuasive evidence that sample
homegrown terrorists had been recent converts to Islam. However, his analysis does not
consider the factors behind radicalization. Hegghammer (2013) builds an original dataset of
jihadists in North America, Western Europe, and Australia for 1990–2010. His sample of 401
terrorism plotters includes domestic and foreign fighters, the latter of which had acquired
experience in a foreign theater. The largest proportion of sample Western jihadists favored
fighting abroad over engaging in domestic terrorist attacks. Hegghammer (2013, p. 6)
hypothesizes that this choice reflected jihadists’ preference, smaller barriers, and training
opportunities associated with fighting abroad. When jihadists return from a foreign theater, they
are more adept at domestic terrorist attacks. Hegghammer only displays simple percentages and
29
provides no statistical inference. The determinants of radicalization and, thus, recruitment are
not analyzed. To address the radicalization question, more data are required that include
demographic and socio-economic characteristics of the jihadists.
3.5 Control within Terrorist Group
With few exceptions,28 the literature treats terrorist groups as a unitary entity, which, among
other things, facilitates game-theoretic and empirical analysis. Arce and Siqueira (2014),
Shapiro and Siegel (2007), and Shapiro (2007, 2013) examine the control problem within
terrorist groups wherein a leader (the principal) must delegate attack planning, funds solicitation,
and recruitment to middlemen (agents), who may hold different views than leaders with respect
to the organization’s goals. According to Shapiro (2013, p. 4): “The terrorist’s dilemma is
simple: leaders need to control how violence is executed and how finances are managed, but the
tools to do so create some measure of operational vulnerabilities and therefore increase the
likelihood of operatives being caught and a group compromised.”
Control problems involve at least two tradeoffs: (i) operational security and financial
efficiency and (ii) operational security and logistical efficiency (Shapiro 2013, p. 8). To achieve
greater resource efficiency, the groups must institute greater audits, but this compromises the
group’s secrecy. Agency problems also plague tactical aspects as agents may work at cross-
purpose with leaders. Shapiro (2007, 2013) highlights adverse-selection and moral-hazard
issues. In terms of adverse selection, terrorist operatives, who survive long enough to become
middlemen, may be less committed and less inclined to assume risks. Moral hazard arises
because agents can profit from information asymmetries at the expense of the organization.
28 A noteworthy exception is Siqueira (2005), who investigates conflict and cooperation between the military and political wings of terrorist groups. Another important exception is Bueno de Mesquita (2005a) who distinguishes moderate and hardline factions and their implications for attacks following government concessions.
30
Given security concerns, an optimal incentive-compatible contract would be ill-advised. Such
organizational concerns mean that terrorist groups are less formidable than in the absence of such
incentive and informational considerations. This, in turn, limits somewhat the required level of
counterterrorism.
A final organizational issue involves terrorist network structure, which creates a tradeoff
between vulnerability and operational capability (Enders and Jindapon 2010 and Enders and Su
2007). After 9/11, terrorist groups relied more heavily on loosely linked networks, where a
minimal number of operatives are linked, so that group infiltration compromises only a few
operatives (Memon et al. 2009). This loosely linked structure limits the group’s ability to
perform complex, large-scale missions, which is good for the targeted public. Tighter linked
groups tend to reside in failed states, where more complex missions occur since 9/11 (George
2018).
To date, the control problem within terrorist groups is not subject to empirical tests owing
to data issues.
3.6 When Are Terrorist Groups Effective?
To judge terrorist groups’ effectiveness, one must devise a definition of this effectiveness.
Abrahms (2006, p. 46) specifies two potential effectiveness measures. Combat effectiveness
refers to the group’s induced level of damages, which increases the group’s visibility with its
audience. Such presence can raise the public’s awareness of the group’s political goals or
grievances, and can induce the public to pressure the government to grant concessions. By
contrast, strategic effectiveness refers to the group’s ability to partially or wholly obtain its
policy objective(s) – e.g., Hamas’ or the PIJ’s objective of an autonomous Palestinian state.
Combat effectiveness may ultimately affect strategic effectiveness, but the few effectiveness
31
studies concentrate on the latter.
To date, the evidence on strategic effectiveness is mixed. Abrahms (2006) examines 28
terrorist groups on the US list of foreign terrorist organizations and finds that these groups
obtained their policy objectives only 7% of the time. In his study, limited success – e.g., al-
Qaida’s demand for the removal of US troops from Saudi Arabia – is not counted as a success.29
Because sample terrorist groups seldom achieved their stated policy goal in his study, Abrahms
(2008) subsequently questions these groups’ rationality. Clearly, Abrahms (2006, 2008) raises
an issue of considerable importance; however, his analysis is not complete and offers no
statistical inference. His sample is small and rather selective; it includes only contemporary
groups that the United States designated as terrorist groups. Additionally, Abrahms’ measure of
success is very stringent.
In earlier studies of suicide terrorist campaigns, Pape (2003, 2005) shows that six of
eleven sample campaigns achieved some significant policy concessions, usually resulting in the
withdrawal of foreign forces. The successful cases included concessions granted by democracies
– e.g., the United States, France, Turkey, and India – to terrorist groups. As Abrahms (2006)
points out, the findings from suicide campaigns cannot necessarily be generalized to all terrorist
campaigns. By focusing on one type of campaign, Pape’s (2003) study has a worrisome
selection bias (Asworth et al. 2008).
Using many of Jones and Libicki’s sample groups, Gaibulloev and Sandler (2014, p. 33)
indicate that 23% joined the political process or achieved victory – see Section 3.3.30 In the
former category, these groups obtained a legal avenue to pursue their political agenda and, in the
latter category, they achieved their goal. This success rate may be small, but it is not nil.
29 Al-Qaida demanded the removal of US troops from the Persian Gulf area, including Saudi Arabia. 30 In Jones and Libicki (2008), 132 of 648 terrorist groups are in this combined category.
32
Currently, Gould and Klor (2010) offer the most comprehensive study of terrorism
effectiveness with respect to achieving a group’s political goals. For Israel during 1988–2006,
these authors utilize geographic variation in terror attacks and local voters’ attitudes to show that
Israeli voters in attack-prone areas were more apt to favor granting territorial concessions to the
Palestinians. The authors estimate a nonlinear relationship between the level of local attacks and
Israeli support for such concessions. Up to an attack threshold, an increase in localized terrorism
augmented voters’ willingness to grant concessions; past the attack threshold, further increase in
terrorism inhibited voters’ willingness to grant concessions. These authors also find that as
terrorism rose, voters increased their support of right-wing parties that were gravitating leftward
with attacks.31 Gould and Klor (2010) exercise care with their identification strategy. By
examining only attacks in Israel, these authors do not have to control for numerous country-
specific factors among heterogeneous countries that make causal inference difficult for large n-
country studies concerning terrorism effectiveness. In addition, these authors show that reverse
causality, wherein voters’ attitudes influence local terrorist attacks, does not hold. Their reliance
on subnational micro-level data over 19 years gives a great deal of variation.32 Unlike some
terrorist campaigns, the goals of the Palestinian terrorists are very clear, which also fosters
inference.
Although the question of terrorist groups’ effectiveness is by no means settled, there is
mounting evidence that these groups, at times, do achieve some of their goals, particularly when
these goals are not too grandiose.
4. Game Theory and Empirical Studies of Terrorism 31 Also see Berrebi and Klor (2006) and Gassebner, Jong-A-Pin, and Mierau (2011) on terrorism and elections. 32 Jaeger et al. (2012) also use micro-level data of opinion polls to investigate how Israeli violence against Palestinians bolstered more political support for Palestinian terrorist groups. This support provided the necessary resources for a sustained terror campaign that pressured Israel to make concessions.
33
Game theory or strategic rational choice has been applied to the study of terrorism. Early
contributions include Selten’s (1977) study of kidnapping and Sandler, Tschirhart, and Cauley’s
(1983) study of terrorist-government negotiations. Noncooperative game theory is particularly
ideal for analyzing counterterrorism because targeted governments and terrorists must employ
actions to foster their self-interest subject to constraints, whose parameters are, in part,
determined by the response of their counterparts. For example, a targeted government’s actions
against a common threat from a terrorist group hinge on the actions being taken by other targeted
governments. Additionally, a terrorist group’s resource constraint depends on the government’s
proactive measures leveled at the group’s personnel and assets. Our intent is to indicate in select
instances how game theory informs policy and empirical studies of terrorism.33
4.1 Making Concessions to Terrorist Hostage Takers
Grim images of ISIS hostages in orange jump suits stoically waiting to be beheaded after their
American and British governments refused to bargain for their release raises a heart-rending
policy issue about paying ransoms. This issue is even more poignant when hostages from Spain,
France, Belgium, Italy, and elsewhere have been released after ransom payments to ISIS (Brandt,
George, and Sandler 2016).34
The proper reaction to hostage-taking terrorists raises a strategic move on the part of a
government. If terrorists are solely motivated to abduct hostages to gain funding or the release
of their comrades in order to support their terrorist campaign, then a credible threat by a
government never to concede to terrorist hostage takers may dissuade terrorists from abducting
33 Sandler and Arce (2003) and Sandler and Siqueira (2009) offer surveys on game theory and terrorism. Also see Schneider, Brück, and Meierrieks (2015). 34 On empirical studies on hostage negotiations, also see Atkinson, Sandler, and Tschirhart (1987), Gaibulloev and Sandler (2009a), and Santifort and Sandler (2013). Bueno de Mesquita (2005a) investigates negotiations between terrorists and a government over general demands, not involving hostages.
34
that government’s citizens. Lapan and Sandler (1988) investigate the time inconsistency of such
a pledge in which the abduction of a sufficiently valuable hostage (e.g., a soldier, diplomat, or
government official) may cause the government to renege on its pledge. The no-concession
pledge may fail to deter hostage taking if terrorists’ net gains from logistical failure (i.e., not
securing intended hostages) or negotiation failure (i.e., failing to receive a concession) are
positive. Martyrdom may yield a positive gain for a logistical failure, while kidnap-generated
publicity or induced societal fear may offer a positive payoff for negotiation failure. ISIS
Internet-posted beheadings have produced such fear and have resulted in the recruitment of
fighters in Iraq and Syria. A government’s no-concession pledge only ends all such hostage
taking if all of the following holds: the pledge is credible and irreversible, the terrorists only
benefit from concessions, and the no-concession consequences for the government is known
(Lapan and Sandler 1988). Because the identity and, thus, value of the hostage cannot be known
beforehand, the consequences from not conceding are necessarily uncertain. Thus, the efficacy
of this strategic move is open to empirical observation.
Based on transnational terrorist hostage incidents during 1968–2005, Brandt and Sandler
(2009) apply refined time series estimating procedures to test the conventional wisdom about the
efficacy of a no-concession policy. Based on monthly and quarterly hostage data, their event
count method reduces bias and augments consistency when estimating cyclical and structural
components of the hostage-taking series, compared to standard forecasting or linear regression
methods. To establish the necessary baseline, their analysis first identifies changepoints to the
hostage-taking data that arise from exogenous factors (e.g., the deployment of metal detectors to
airports in 1973 and the end of the Cold War) for each of the hostage-taking series (i.e.,
skyjackings, kidnappings, and other hostage events).
Brandt and Sandler (2009) identify the lag structure of the three (monthly and quarterly)
35
hostage-taking series. In so doing, they estimate the short- and long-run impact multipliers
associated with an additional negotiation success for the terrorists. For kidnappings, the long-run
multiplier is 2.62 additional incidents; for skyjackings, the long-run multiplier is 0.59 additional
incidents. The long-run multiplier for other hostage incidents is insignificant (Brandt and
Sandler 2009, p. 770). Hence, for kidnappings and skyjackings, the conventional wisdom is
deemed valid: giving into terrorist demands results in more such incidents. Moreover, these
concessions can fund other operations of the terrorists.
For the period studied by Brandt and Sandler (2009), there were fewer religious
fundamentalist terrorist groups than after 2005. Also, the United States was much less consistent
in maintaining its no-concession pledge prior to 2001 than after 2001. During 1978–2000, the
United States gave concessions to kidnappers 23.1% of the time, whereas during 2001–2013, it
gave concessions to kidnappers 10.7% of the time (Brandt, George, and Sandler 2016, p. 46).
ISIS and al-Qaida in Iraq, which used beheadings, surfaced during 2001–2013. Brandt, George,
and Sandler (2016) apply their earlier methodology to three samples: (i) the US-UK that
generally stood by their no-concession pledge; (ii) ten concessionaire countries that less
frequently stood by their no-concession pledge; and (iii) the EU countries, less the UK, that less
frequently stood by their no-concession pledge. These authors find that making a concession
increased the median baseline kidnappings by 64 to 87%, depending on the cohort of countries
and the particular changepoint regime. Once again, the message is unmistakable: making
concessions increased the level of kidnappings. For this second study, these authors only
examined kidnappings, which became the lion’s share of hostage incidents after 9/11.
4.2 On US Military Aid, Negotiations, and Moral Hazard
Our second example not only indicates how game theory can inform counterterrorism policy, but
36
also shows how strategic factors can result in perverse incentives as in the previous case. In
particular, we examine Bapat’s (2011) provocative analysis of US military aid to countries
hosting terrorist groups. In his underlying game-theoretic model, there are three players: the
United States, the recipient (host) country, and the host’s resident terrorist group. The United
States first chooses its level of aid. The host country then decides whether to negotiate with the
terrorists, to defend against them, or to mount an offensive to defeat them. If there is a
negotiation, the terrorists must accept or reject the host country’s offer. When the offer is
accepted, the United States must decide whether or not to continue its aid. The game can
conclude in three ways: the host government loses in a battle with the terrorists; the host
government and the terrorists reach an accommodation; or the terrorists are defeated in an
offensive or a failed attempt to seize power. Bapat (2011) solves for the solution to this
infinitely repeated game with incomplete information.
This solution displays the moral hazard problem associated with US military aid to a
government, hosting a terrorist group. Ideally, this aid is intended to assist the host country to
defeat the terrorists, thereby stabilizing its regime while limiting the risks of terrorist attacks on
US interests. However, the aid sets up a perverse incentive to the host country not to defeat the
resident terrorist group in order to keep the aid coming. As Bapat (2011) points out, large
military aid flows to the Musharraf regime in Pakistan after 9/11 resulted in little Pakistani action
against the Taliban. Similar scenarios were true in post-9/11 Afghanistan and Yemen where
little were done by recipient governments to defeat their resident terrorists. Despite this moral
hazard concern, Bapat’s (2011) solution shows that the United States still profits from the aid
because it inhibits an accommodation between the host and the terrorists, thereby maintaining the
US-favored regime status quo.
Bapat (2011) provides an empirical test of his model based on a hazard model,
37
corresponding to the duration until the resident terrorists are defeated. His dataset contains 184
terrorist campaigns against 48 host countries during 1997–2006. He finds that US military
assistance increases the duration of a resident terrorist group in an aid-recipient host country
from a mean of 4.69 to 7.82 years, a 67% increase! This is another example of an unintended
negative consequence from well-intended counterterrorism policy. He also shows that host
countries with a larger affinity to the United States (i.e., closer voting record on the UN General
Assembly with US-held positions) display further increases in the duration of their resident
terrorist groups to 13.38 years. This follows because the United States is more motivated to keep
its military aid flowing to these supportive countries even if the terrorist threat remains. Cutting
off aid may result in a host-terrorist accommodation that ends support of US policy positions.
Bapat’s (2011) theory-based empirical test explains the often-observed failure of military aid to
eliminate resident terrorist groups.
4.3 Game Theory and Counterterrorism Effectiveness
Game theory informs the empirical analysis of counterterrorism practice by indicating the likely
choice of defensive and proactive measures by commonly targeted governments.35 In other
instances, the game involves the endogenous interaction among targeted government(s) and the
terrorist organization (Cárceles-Poveda and Tauman 2011, Jindapon and Neilson 2009, Powell
2007, Siqueira and Sandler 2006, and Zhuang and Bier 2007). Moreover, the players may be
uninformed about their adversaries’ type or resources (Arce and Sandler 2007, Bier, Oliveros,
and Samuelson 2007, Lapan and Sandler 1993, and Overgaard 1994). And in still other
instances, players include a targeted government, a terrorist organization, potential terrorist
35 Key theoretical articles include Arce and Sandler (2005), Kunreuther and Heal (2003) Sandler and Lapan (1988), and Sandler and Siqueira (2006). The latter forms the basis for the described model in the text. Propositions from some of this literature are tested in the laboratory – see Arce, Croson, and Eckel (2011).
38
recruits, and/or voters (Bueno de Mesquita 2005b, 2007 and Siqueira and Sandler 2007, 2010).
Our intention is not to review the game-theoretic literature on counterterrorism, but rather
to discuss briefly strategic aspects of defensive and proactive measures by commonly targeted
countries. This model explains overspending on such measures as governments seek to transfer
transnational terrorist attacks to foreign venues. Among targeted countries, this regional
transference of terrorist attacks shows up before and after 9/11 in Figures 7 and 9 in terms of
incidents and casualties, respectively. Enders and Sandler (2006, 2012) show the geographical
transference of transnational terrorist attacks from the Western Hemisphere and Europe to
Africa, Asia, and the Middle East. Because there is no requisite panel defense data, researcher
must infer this transference after a watershed event, such as 9/11 that is believed associated with
greater defensive spending in the West. Among target types, an analogous transference is
evident in Figure 11, as official and business targets are hardened.
Consider a scenario in which two countries are targeted by the same terrorist group that
can strike either country’s interests at home or abroad. It is reasonable to assume that the same
magnitude attack is more devastating to a country’s interests at home than abroad. At home,
defensive measures against transnational terrorism attacks not only limit the consequences of
such an attack, but also decrease its likelihood. The latter arises as the terrorist group seeks a
softer target abroad. Greater defense in either country may deflect an attack abroad where both
countries’ assets are harmed to varying degrees.36 Such defensive countermeasures imply at
least two opposing externalities. The more important one is the negative consequences of
transferring a terrorist planned attack abroad to a less protected country (Sandler and Lapan 1988
and Sandler and Siqueira 2006). A smaller positive externality from home defense is the
36 Conceptually, the terrorist group is a passive agent that seeks out the most vulnerable country with the highest anticipated payoff. Cárceles-Poveda and Tauman (2011) allow the terrorist group to be an active agent. The transference result still holds with an active terrorist group as targeted countries work at cross-purposes.
39
protection afforded to foreign-held assets.
Given the dominant transference externality, each of the two targeted countries’ Nash
reaction paths, relating the country’s own defense choice to that of the other country, is
positively sloped, consistent with strategic complements and a defensive race. The latter leads to
overprovision of defense compared to the social optimum level.37 To some extent, the protecting
country’s foreign interests curb the motive to transfer attacks abroad through a fortification race
(Bandyopadhyay and Sandler 2011, 2014), but this curb is attenuated given that a country’s
home interests are more important than its foreign interests. The presence of transference
externalities indicates the need for international cooperation regarding the choice of defensive
countermeasures against a common terrorist threat.
Next, we consider proactive measures (e.g., retaliatory raids, drone attacks, or group
infiltration) by either targeted country against the common terrorist threat. Such actions decrease
the likelihood and consequences of a transnational terrorist attack at home and abroad. As such,
proactive measures against this common threat give rise to positive externalities to the other
targeted country, given the purely public nature of these actions. Now, the associated Nash
reaction paths are negatively sloped, consistent with strategic substitutes for which too few
measures are provided by the targeted countries.
If many countries are in the terrorist group’s cross hairs, then the country sustaining the
greatest losses is the likely one to confront proactively the terrorists, as the United States did
against the Taliban and al-Qaida following 9/11 (Arce and Sandler 2005). Nevertheless, the
proactive country is not anticipated to internalize fully the positive externality that its offensive
confers on other at-risk countries. If we evaluate the cooperative solution at the Nash
equilibrium level of proactive measures, underprovision is implied. Once again, there is a clear
37 This analysis can be readily extended to more targeted countries (Cárceles-Poveda and Tauman 2011).
40
role for international cooperation.
Other factors can enrich the game-theoretic analysis of counterterrorism. First, we can
allow for leader-follower behavior, which worsens proactive underprovision and but limits
defensive overprovision (Sandler and Siqueira 2006). Second, for proactive measures, backlash
can be included in which these actions create new grievances that can offset benefits derived
from weakening the terrorist group (Das 2008, Rosendorff and Sandler 2004, 2010, and Siqueira
and Sandler 2007). Third, both defensive and proactive measures can be chosen together
(Bandyopadhyay and Sandler 2011). Fourth, more agents (e.g., voters, terrorists, and supporters)
can be included in the analysis. Fifth, we can account for more political considerations when
investigating counterterrorism policy (Bueno de Mesquita 2007). Sixth, these game-theoretic
choices can be viewed solely within a country besieged with domestic terrorism and needing to
protect alternative targets or venues, leading to transference among target types as empirically
documented by Brandt and Sandler (2010, 2012). A central government can internalize these
externalities.
5. The Effectiveness of Counterterrorism Policies
To fight terrorism effectively, the world must learn from experience what countermeasures work
and what ones do not. Even before 9/11, there were some noteworthy investigations on this
issue. In a seminal study, Landes (1978) applies a Becker-inspired crime deterrence model to
investigate what best deterred skyjackings in the United States. His study was motivated, in part,
by the observed sharp decline in US skyjackings following the installation of metal detectors in
US airports on January 5, 1973. Using Federal Aviation Administration (FAA) skyjacking data
for 1961–1976, Landes (1978) first presents a linear regression on the number of US hijackings
per quarter based on some potential deterrent measures and opportunity cost variables (e.g.,
41
unemployment rate and GDP per capita). Significant deterrents included the probability of
apprehension and the average sentence of convicted hijackers. Perhaps surprising, neither the
presence of sky marshals nor the death of the hijacker deterred skyjackings.38 In addition,
Landes examines what considerations increased the time interval between hijackings and shows
that this interval increased with the probability of apprehension, the conditional likelihood of
incarceration, and the length of the sentence. Greater income per capita and reduced
unemployment increased the interval between skyjackings (Landes 1978). Based on his
estimated model, Landes (1978, p. 21) computes a counterfactual to show that in the absence of
metal detectors there would have been over 2.7 additional US skyjackings per quarter. Given the
deployment cost of these metal detectors and the estimated benefit from fewer hijackings,
Landes (1978, pp. 21-2) indicates that these metal detectors had a large benefit-cost ratio. This
landmark study indicates that technological-based defensive measures work well against specific
attack modes; however, such barriers can induce terrorists to substitute to other unprotected
attack modes (Enders and Sandler 2004).
Following up on Landes (1978), Enders and Sandler (1993) utilize a vector-
autoregression-intervention (VAR-I) analysis to investigate the substitution-induced
consequences of the installation of metal detectors in airports worldwide during the first quarter
of 1973. Their VAR model allows for interaction among the various hostage-taking and other
attack mode time series, thereby permitting substitution and complement relationships as
terrorists react to these barriers by seeking softer targets. This method allows for the endogenous
choice among modes of attacks and is used by some post-9/11 articles (e.g., Brandt and Sandler
2009). In the short run, these metal detectors reduced skyjackings by just over twelve incidents
38 Sky marshals did not make themselves known for fear that discharging their gun would pierce the fuselage and bring down the plane.
42
per quarter but increased other hostage-taking incidents by about four per quarter (Enders and
Sandler 2012). In the longer run, these other hostage-taking incidents rose by just over five
incidents per quarter. Even more disturbing, an updated study shows that the introduction of
metal detectors increased terrorist incidents with casualties by 8.83 and 12.38 incidents per
quarter in the short and long run, respectively, as terrorists substituted out of skyjackings, which
generally had few casualties before 9/11, into more casualty-rich incidents to capture headlines
(Enders and Sandler 2012, p. 91). Such unintended downsides of metal detectors are not
recognized by Landes (1978).
Enders and Sandler’s (1993) methodology is applied to other defensive measures to
illustrate unintended consequences. For example, the fortification of US embassies resulted in
increased assassinations of diplomatic personnel outside of secured embassy compounds. The
effectiveness of technological barriers fades with time as terrorists devise means to circumvent
them, such as massive truck bombs to get beyond embassy walls or plastic guns and containers
with flammable liquids to get past metal detectors (Enders, Sandler, and Cauley 1990).
Prior to 9/11, the effectiveness of retaliatory raids against alleged state sponsors of
terrorism has been analyzed. Enders and Sandler (1993, 2012) apply their VAR-I method to
ascertain the effectiveness of the US retaliatory bombing raid on Libya on April 15, 1986 for
Gaddafi’s alleged involvement in the La Belle discotheque bombing in West Berlin on April 4,
1986 that killed 3 and wounded 231 including 62 Americans (Mickolus, Sandler, and Murdock
1989, pp. 365-7). Once again, their VAR method permits multiple time series (e.g., attacks
against US and UK interests and attacks against other countries’ interests) to be examined to
account for substitution and complementarity. Also, the timing of reactions is captured. Enders
and Sandler (1993) find that terrorist attacks against US and UK interests skyrocketed following
the raid as terrorists moved planned future attacks into the present to display their outrage. UK
43
interests were targeted since US warplanes had taken off from British airbases. Within a few
quarters, such attacks dropped precipitously as terrorists had to replenish their spent resources.
The overall mean of terrorist incidents did not change owing to the raid. In a similar study of
Israeli retaliatory raids following Palestinian terrorist attacks, Brophy-Baermann and Conybeare
(1994) uncover the same sine-wave pattern, indicative of terrorists’ intertemporal substitution
(Berrebi and Lakdawalla 2007 and Enders and Sandler 2002), in which these raid did not curb
Palestinian terrorism in the medium term.
After 9/11, the sustained War on Terror is seen to have apparently little long-term effect
on global terrorism. This is suggested by the plots of the transnational terrorism incidents and
casualties per incident in Figures 1 and 2 after 2006 and is further supported by the rising
proportion of casualty incidents in Figure 3. A similar message that post-9/11 proactive
measures have a poor payback comes from the counterfactual-based study of Sandler, Arce, and
Enders (2009), where the return to the War on Terror was pennies on the dollar. Furthermore,
enhanced border security since 9/11 caused transference of attacks from North America and
Europe to the Middle East, Africa, and Asia, consistent with the earlier defensive game theory
model (Drakos and Gofas 2006 and Enders and Sandler 2006).
5.1 Drones and Targeted Killings
After 9/11, drones were used by the United States to target terrorist assets and Islamic terrorist
groups’ leadership in Afghanistan, Pakistan, Yemen, and elsewhere. In Pakistan, these drones
were dispatched to seven agencies or districts in the Federally Administered Tribal Areas
(FATA) (Fair 2010). Opponents argue that drones are locally unpopular and create backlash that
fosters terrorist recruitment (Bloom 2005 and Rosendorff and Sandler 2004). Proponents view
effective drone attacks as disrupting and degrading targeted terrorist groups, thus reducing the
44
incidence and lethality of their attacks (Jaeger and Siddique 2011 and Johnston and Sarbahi
2016).
The evidence supports both viewpoints with somewhat more support for limiting terrorist
attacks in the short run following a successful drone strike, especially in Pakistan. For example,
Jaeger and Siddique (2011) apply a multiple time series method, similar to Enders and Sandler
(1993), to show that drone attacks had no significant effect in Afghanistan, but did serve a short-
term deterrent effect in Pakistan. For Pakistan, Jaeger and Siddique (2011) find an increase in
the vengeance or backlash effect during the first week following a successful drone strike on
Taliban and al-Qaida assets. The short-term reduction in terrorist attacks came during the second
week after the drone strike, consistent with an intertemporal transference of attacks. In a
subsequent study, Johnston and Sarbahi (2016) used geocoded data on drone strikes and terrorist
attacks in Pakistan. Their empirical method is a spatial panel, where the unit of analysis is the
district-week. These authors find that terrorist incidents and casualties decreased by 5 and 25
percentage points, respectively, in the week of the drone strike. However, the killing of militant
leaders by drones did not reduce terrorist attacks or their consequences in a significant fashion.
A very interesting additional finding was that there was no apparent transference externality;
namely, the short-term decrease in terrorism did not increase terrorism in neighboring regions.
Moreover, the drone attacks reduced selected assassinations of tribal elders by Islamic
extremists. Long-term permanent disruptive impacts of drone attacks are not addressed. The
dynamics of the effectiveness of drone strikes warrant further investigation.
A related proactive policy is the use of targeted killings of terrorist operatives and leaders
without the use of drones. Once again, such killings may incite more violence through backlash
and recruitment, or alternatively they may limit violence through disruption and deterrence.
Tests of these opposing forces are investigated for the Second Intifada (2000–2005) and beyond.
45
Palestinian violence often assumed the form of suicide bombings of Israeli civilians, while Israeli
violence took the form of targeted killings. These assassinations were often directed at
Palestinian targets where the attacks originated. Jaeger and Paserman (2008) investigate the
causality of the violence, showing that Palestinian suicide attacks incited Israeli retaliation but
that Israeli violence apparently did not induce a Palestinian response in terms of additional Israeli
fatalities. As such, this evidence does not support a tit-for-tat cycle of violence as hypothesized
by Bloom (2005). There is a short-term deterrent outcome in terms of reduced Palestinian
violence coming from Israeli targeted killings.
In a follow-up study, Jaeger and Paserman (2009) examine further the dynamics of
suicide attacks and targeted killings during the Second Intifada. This study treats both sides to
the conflict in a symmetric fashion. Moreover, their data not only account for the location of the
attack, but also the origin location of the perpetrators. This location data better allow for an
assessment of the vengeance versus disruption effect of Israeli targeted killings. These authors
find that a successful suicide attack by Palestinian terrorists resulted in 6.7 more Palestinian
deaths in the following week. Israel reacted to actual, but not planned, suicide attacks. Based on
geocoded data, Jaeger and Paserman (2009) show that targeted killings in the origin district of
the attack reduced subsequent attacks in the short run from that district, consistent with the
disruption hypothesis.
5.2 Thinking Outside the Box
Typically, defensive and proactive measures are put forward as the best ways to counter the
threat of terrorism. Some proactive policies in terms of foiling plots or infiltrating groups can be
quite effective, but there is no global dataset that records such actions so that knowledge of these
efforts is episodic and not subject to rigorous tests.
46
With respect to extremist religious terrorist groups, Berman (2009) puts forward
increases in state-provided social services as an effective means to loosen the grip that these
groups exercise over their operatives and supporters. These radical groups use their “club-
provided” services to elicit sacrifices from adherents (see Section 3.4). In some cases, members
are willing to commit suicide terrorist acts so that their families continue to receive these
excludable services. Berman and Laitin (2008) show empirically that service-providing terrorist
groups (e.g., Hamas and Hezbollah) were associated with more lethal attacks than their non-
service-providing counterparts. Moreover, they find that service-providing terrorist groups
engaged in a higher proportion of suicide attacks. Additionally, these groups used suicide
attacks against hard targets inside the Green Line in Israel. By eliminating the radical group as
the sole provider of these services, the government can break the hold that these groups weigh
over members. This is an interesting proposal that is worthy of empirical test beyond that of
Berman and Laitin (2008) as appropriate data become available.
Dugan and Chenoweth (2012) also think innovatively by investigating whether retaliatory
or conciliatory actions during three violent periods – the First Intifada (1987–1993), the Oslo
Lull (1993–2000), and the Second Intifada – involving Israel and the Palestinians served to ease
or exacerbate terrorism. By raising the expected utility of nonterrorism through rewards,
conciliatory acts may reduce terrorism; 39 by lowering the expected utility of terrorism through
punishment, retaliatory acts may reduce terrorism. Which policy works best to curb terrorism is
an empirical question. During these violent periods, these authors use a text-reading program
applied to Reuter’s archives to code four types of Israeli actions: discriminate retaliation,
indiscriminate retaliation, discriminate conciliation, and indiscriminate conciliation. Based on a
Negative Binomial regression, Dugan and Chenoweth (2012, pp. 614-15) offer evidence that
39 Also, see theoretical pieces by Anderton and Carter (2005), Frey and Luechinger (2003), and Sandler (2010).
47
relatively large numbers of conciliatory acts (i.e., more than eight) and indiscriminate
conciliatory acts reduced terrorism.40 However, they uncover no evidence that indiscriminate
retaliatory acts lowered terrorism. In fact, such repression either had no effect or raised
terrorism, consistent with the notion of backlash. Thus, conciliatory acts – even indiscriminate
types – are more effective than indiscriminate retaliatory acts.
In an innovative exercise, Berman, Shapiro, and Felter (2011) investigate whether service
provision during the Iraq insurgency reduced attacks against occupying forces. For small-scale
reconstruction projects between March 2003 and December 2007, these authors show that
services and counterinsurgency are complements. In fact, the local community helped
counterinsurgency efforts by providing useful strategic information on insurgents’ location. This
information flow increased as more small-scale reconstruction projects were built. Berman,
Shapiro, and Felter (2011) rely on a unique geocoded dataset on violence against US and Iraqi
forces and the location of these reconstruction projects. Once again, the message is that
community projects directed at potential terrorist supporters may curb violence and reduce the
effectiveness of terrorists’ and insurgents’ propaganda (also, see Berman 2009 and Siqueira and
Sandler 2007).
As a deterrent to suicide terrorism during the Second Intifada, Benmelech, Berrebi, and
Klor (2015) examine house demolitions. Punitive demolitions are leveled against the houses of
the family of a suicide terrorist or operatives involved in a suicide attack, while precautionary
demolitions are directed against a region from which a suicide attack may emanate. Unlike
precautionary house demolitions, punitive demolitions are discriminatory. To test the
effectiveness of each type of demolition, the authors join longitudinal micro-level data for 2000–
40 This is in keeping with the notion that kind acts by a terrorism-besieged government may win back the hearts and minds of terrorist supporters – see Jaeger et al. (2012) and Laitin and Shapiro (2008).
48
2005 collected by Israeli authorities on demolitions with data on suicide attacks against Israeli
targets. Their analysis shows that punitive demolitions are effective – a one standard deviation
increase in these demolitions resulted in an 11.7% fall in suicide attacks. In contrast,
precautionary demolitions resulted in backlash for which a one standard deviation increase in
these demolitions ignited a 48.7% increase in suicide attacks! The message is similar to that in
Fearon and Laitin (2003) that countermeasures must be discriminate to be effective (Jacobson
and Kaplan 2007 and Rosendorff and Sandler 2004).41
5.3 Foreign Aid and Counterterrorism
Following 9/11, academic interest grew in ascertaining how foreign aid influenced transnational
terrorism and how the War on Terror affected foreign aid. Because many transnational terrorist
groups, which target Western interests, reside in developing countries, foreign aid can be used by
targeted donor countries to ameliorate its terror threat (Bandyopadhyay, Sandler, and Younas
2011, 2014 and Azam and Delacroix 2006). In evaluating the evidence, one must not lose sight
of the moral hazard problem shown by Bapat (2011) (Section 4.2). Fleck and Kilby (2010)
document changes in US bilateral aid allocations before and after 9/11. According to these
authors (p. 185), US aid rose during the Bush administration; however, need-driven aid fell
relative to other motives. In particular, Fleck and Kilby (2010, pp. 187-8) find that a recipient’s
military budget was a significant determinant of increases in US bilateral aid, suggesting US
interest to support countries that addressed a resident terrorist threat. In an expanded panel study
of 22 donor countries, Dreher and Fuchs (2011) show that official development assistance
(ODA) increased, but not monotonically, during the War on Terror. These authors do not
41 This finding is similar to that of Zussman and Zussman (2006) in which Israeli assassination of Palestinian military personnel resulted in little backlash in contrast to Israeli assassination of senior Palestinian political leaders.
49
discern a significant relationship between aid flows and terrorist incidents. Based on their aid
allocation estimations, Dreher and Fuchs (2011, p. 337) show “that countries where terror
originates are not more likely to receive aid as a consequence, but if they are selected, they
receive larger amounts of aid.” Thus, the War on Terror affected aid flows somewhat, but other
factors – e.g., voting records in the UN General Assembly and sponsoring terror – had a more
profound influence.
The more interesting question is the effectiveness of aid in ameliorating terrorism or its
negative consequences. Most studies focus on aid and transnational terrorism (see, e.g., Azam
and Delacroix 2006 and Azam and Thelen 2008, 2010). This effectiveness question is
intrinsically difficult to identify since terrorism can attract foreign aid and foreign aid may or
may not limit terrorism. Azam and Thelen (2010) exercise care to address this endogeneity and,
by so doing, conclude that foreign aid had a significant effect in curbing transnational terrorist
incidents originating from aid-recipient countries. However, they also find that US military
intervention increases such terrorist incidents. In a follow-up study, Young and Findley (2011)
disaggregate foreign aid by sectors – education, health, conflict prevention, governance, and civil
society – based on AidData. They employ a couple of methods to address endogeneity concerns,
including dynamic GMM models. Young and Findley (2011) find that education, health, civil-
society, and conflict-prevention aid reduced the incidence of transnational terrorism originating
from the aid-recipient country. Conflict-prevention aid had the greatest terrorism-reducing
effect, while governance aid did not have a significant effect. We believe that it is worth
returning to his question to get more robust results as more panel data sectoral aid in terrorism-
plagued countries become available.
5.4 International Cooperation and Counterterrorism
50
For transnational terrorism, the game theory in Section 4 indicates that defensive measures tend
to be overprovided, while proactive measures tend to be underprovided. Thus, there is a need for
international cooperation when addressing common terrorist threats. After 9/11, select countries
joined US-led actions to attack the Taliban and al-Qaida in Afghanistan. More recently, some
NATO allies joined US bombing missions against ISIS targets in Syria – e.g., French bombing
raids on Raqqa, days following the November 13, 2015 ISIS attacks on Paris. On occasion,
targeted countries share intelligence. Nonetheless, most countries address their transnational
terrorist threats independently and, for the most part, international cooperation has not been very
prevalent.
The United Nations and the international community enacted a host of conventions and
resolutions against terrorism and its practices – e.g., taking hostages, skyjackings, and downing
airliners. A recent instance is the International Convention for the Suppression of Terrorist
Bombings, signed in December 1997 and entered into US law on May 2001. Based on time
series intervention analysis, no such UN conventions changed the mean of the outlawed mode of
attack after ratification (Enders and Sandler 2012 and Enders, Sandler, and Cauley 1990), thus
calling into question the effectiveness of such international actions that have no enforcement
mechanism.
Similarly, efforts to cut off terrorist financing through guidance from international
organizations, such as the International Monetary Fund and the Financial Action Task Force on
Money Laundering (FATF), has met with mixed success (Basile 2004). This follows because
terrorists have found ways to circumvent these efforts. Only a few noncompliant banking
institutions can spoil the collective action of compliant banking institutions, since curbing
terrorist financing is a weakest-link public good for all targeted countries (Sandler 2005).
After 9/11, an INTERPOL-surveillance system to secure ports of entry against terrorists
51
has yielded a large apparent payoff at a small cost (Sandler, Arce, and Enders 2011).42 Based on
terrorist arrest data provided by INTERPOL, these authors calculated, under various
counterfactual scenarios, the value saved through INTERPOL-surveillance-assisted arrests.
These savings were in terms of fewer terrorist incidents and the concomitant reduced deaths,
injuries, and property losses. Sandler, Arce, and Enders (2011) build their counterfactuals based
on the casualties and losses associated with an average transnational terrorism incident during
the years prior to the surveillance system being deployed. Value-of-life computations translate
avoided deaths and injuries into a dollar value. In addition, INTERPOL provided these authors
with the cost for the components of the surveillance system. Their exercise shows that every
dollar of INTERPOL’s surveillance expense returned $40 to $200, depending on 12 alternative
counterfactual scenarios. The large return is indicative of the network externality that this
system provides. Thus, countries may reap gains from cooperation that mandates little expense
or loss of autonomy. This example highlights that there are instances of low-hanging fruit with
respect to coordinated efforts to curb transnational terrorism.
6. Three Alleged Causes of Terrorism
After 9/11, the news media and political leaders speculated on the causes of these unprecedented
attacks (Li and Schaub 2004). Three potential causes for transnational terrorism were put
forward: globalization (Sageman 2008 and Schneider, Brück, and Meierrieks 2015, p. 131),
world poverty (Krueger and Malečková 2003), and democracy (Eubank and Weinberg 1994,
2001). We examine each cause in seriatim from the lens of the literature that each generated.
42 See Enders and Sandler (2011) on the factors that influence countries’ decisions to install INTERPOL’s MIND/FIND surveillance system and Gardeazabal and Sandler (2015) on the role of this system in the fight against terrorism.
52
6.1 Globalization and Transnational Terrorism
Economic globalization captures the increased flows of transactions across international borders.
These flows encompass goods, services, financial capital, virtual transmissions, productive
factors, and externalities as countries’ economies become more integrated. Li and Schaub
(2004) indicate that globalization may foster transnational terrorism by curbing the cost of illegal
activities, providing greater cover for transiting terrorists, offering greater financing for terrorism
(e.g., enhanced remittances), supplying transmission channels for terrorist propaganda, and
augmenting grievances through greater income disparity. Globalization may also foster
transnational terrorism through a demonstration effect as increased transactions, real and virtual,
bind countries closer together. Grievance in one country can spill over to another through the
media, the Internet, and exchanges. By contrast, globalization may inhibit transnational
terrorism by improving economic development, thereby reducing potential grievances. In a
dynamic panel study of 112 countries for 1975–1997, Li and Schaub (2004) use trade, FDI, and
portfolio investments as proxies for globalization. Notably, none of the authors’ sample years
are near 9/11. They find no direct linkage between globalization and transnational terrorism.
This initial study on the alleged globalization cause of transnational terrorism never really
addressed the obvious endogeneity concern that transnational terrorism may influence the
authors’ three proxies for globalization (see Section 7). The globalization-terrorism linkage
poses a difficult empirical exercise. Although the Li and Schaub (2004) study is well-cited, it
does not put the question to rest.
In a general study of the causes of terrorism, Gassebner and Luechinger (2011) apply a
modified extreme bound analysis (EBA) to a host of possible determinants of transnational
terrorism including globalization based on Dreher’s (2006) KOF index of globalization. Among
other things, they show that globalization is not a robust determinant of transnational terrorism in
53
the various runs based on venue country, victim country, or perpetrators’ origin. Their
globalization finding agrees with other panel studies.43 Many subsequent articles rely on
Gassebner and Luechinger’s (2011) “robust” variable from their EBA study to come up with a
set of controls when investigating other determinants of terrorism. Thus, it is important that
some essential issues with EBA are raised. Brock, Durlauf, and West (2003) indicate some
important concerns with EBA that include, among others, insensitivity to the relative goodness
of fit of different models, so that a misspecified model may determine the robustness of a
variable. In addition, they indicate that EBA requires an excessively strong standard for
robustness. As recognized by Gassebner and Luechinger (2011), their modified EBA requires
linear estimates. Moreover, their exercise cannot account for structural relations, omitted
variable biases, or simultaneity concerns. The linearity issue is particularly germane for the
alleged determinants of terrorism because the next two subsections indicate that nonlinear
estimations best capture the relationship between GDP per capita and terrorism and the
relationship between regime type and terrorism.
In summary, there is little convincing evidence supporting globalization as a cause of
transnational terrorism; however, there is room for a better methodology to address this cause.
For the present, we must look elsewhere for a cause.
6.2 Poverty and Transnational Terrorism
An initial influential study on the potential relationship between poverty and terrorism is by
Krueger and Malečková (2003), who first present evidence from Palestinian opinion polls that
show that a large majority of highly educated, and presumably better off, Palestinians supported
43 See Drakos and Gofas (2006), Kurrild-Klitgaard, Justesen, and Klemmensen (2006), and Gaibulloev, Piazza, and Sandler (2017).
54
the use of terrorism. Next, these authors examine the biographical information of 129 members
of Hezbollah’s military wing, whose 28% poverty rate was five percent lower than that of the
host population. Moreover, these fighters’ education attainment was statistically greater than
that of the general public. Their final bit of evidence comes from a negative binomial cross-
country analysis of 129 to 148 countries during 1997–2002, for which they find a marginal
negative relationship (p = 0.11) between transnational terrorism and GDP per capita. However,
when they control for civil liberties, the poverty link vanishes, leading Krueger and Malečková
(2003) to conclude that lack of civil liberties, and not poverty, drives transnational terrorism.
This finding is similar in spirit to that of Krueger and Laitin (2008) who demonstrate that
political repression, not GDP per capita, correlated with transnational terrorist incidents in the
perpetrators’ home countries.
The literature offers a wide variety of results on the relationship between GDP per capita
and terrorism. Some articles display a positive relationship, (e.g., Bandyopadhyay and Younas
2011, Blomberg, Hess, and Weerapana 2004, and Gassebner and Luechinger 2011); other
articles uncover a negative relationship (e.g., Li and Schaub 2004); and still others find no
relationship (e.g., Abadie 2006 and Krueger and Malečková 2003). Most articles on this
empirical relationship rely on panel estimates and pay little attention to functional form. A few
studies uncover an inverted U-shaped relationship between terrorism and GDP per capita (e.g.,
Enders and Hoover 2012 and Lai 2007).
The literature uses different country samples, diverse time periods, and alternative
measures of transnational terrorism. Hence, a robust methodology is needed that can produce
consistent findings for varying controls, sample periods, and sample countries. To date, the most
robust analysis is that of Enders, Hoover, and Sandler (2016) who employ a flexible nonlinear
55
empirical specification that includes linear, quadratic and other functional forms.44 Their
empirical analysis is performed on alternative series of terrorist incidents that involve casualties,
since such incident are more apt to be reported and less driven by random factors. Their
regressions indicate a consistent nonlinear relationship between real GDP per capita and eight
alternative measures of terrorism, accounting for attack venue, perpetrators’ nationality, and
terrorism type (i.e., transnational and domestic). Two alternative time periods – 1970–1992 and
1994–2010 – are analyzed that correspond to the dominance of the leftist and religious
fundamentalist terrorists, respectively. In all instances, their nonlinear estimates outperform
linear and quadratic representations.
For all eight terrorism series, there is a peak level of terrorism at some intermediate range
of GDP per capita. There is a nonsymmetrical relationship on either side of the peak, leading to
a rejection of a quadratic relationship between income per capita and terrorism. This peak
shifted between the two time periods: occurring at a relatively high intermediate GDP per capita
when the leftist terrorists dominated in the pre-1993 era, and occurring at a relatively low
intermediate GDP per capita when the religious fundamentalist terrorists dominated in the post-
1993 era. This shifting peak is consistent with many left-wing terrorist groups originating from
and operating in relatively well-to-do countries during the earlier period, and many religious
fundamentalist terrorist groups originating from and operating in less well-to-do countries during
the latter period. The former consideration may explain the preponderance of positive linear
estimates for the income-terrorism relationship before the early 1990s. The Enders, Hoover, and
Sandler (2016) study shows that neither very low nor very high GDP per capita is conducive to
terrorism. At low GDP per capita, subsistence is an overriding concern, thus limiting terrorism.
At high GDP per capita, grievances are not great and society invests in counterterrorism, thus
44 Their method is known as a nonlinear smooth transition regression.
56
curbing terrorism. Moreover, these nonlinear relationships are robust to myriad controls that
display anticipated signs.45 The relationship between GDP per capita and terrorism is much
more nuanced than presupposed by political leaders, the media, and researchers. Not only is the
relationship nonlinear, but its nature alters with circumstances – e.g., the predominant type of
terrorism and the origin country of perpetrators – thereby confounding estimation. In summary,
there is no discernible relationship per se between poverty and alternative forms of terrorism.
6.3 Regime Type and Transnational Terrorism
Given that 9/11 took place in a democracy and high-profile transnational terrorist attacks before
and after 9/11 targeted democracies, the relationship between regime type and terrorism is of
great interest. There are three schools of thought on this relationship. The “strategic” school
argues that democracy facilitates terrorism by limiting its price through freedom of movement,
freedom of association, the protection of civil liberties, rights to due process, and the ability to
acquire weapons (Eubank and Weinberg 1994, Eyerman 1998, and Hoffman 2006). Moreover,
in democracies, freedom of the press provides terrorists with the publicity that they crave (Li
2005 and Rohner and Frey 2007). By contrast, the “political access” school views democracies
as assuaging grievances through greater political participation, thereby reducing terrorism
(Eyerman 1998 and Li 2005). The “democratic protection” school stresses that strong liberal
democracies take swift actions to counter terrorism in order to maintain their legitimacy
(Gaibulloev, Piazza, and Sandler 2017). Strict autocracies also take draconian measures to
counter terrorism. Given these opposing considerations, the relationship between regime type
and transnational terrorism is an empirical question.
Findings in the empirical literature on this relationship are mixed and generally
45 Domestic terrorism displays the same nonlinear relationship with GDP per capita.
57
unconvincing. Most articles find a positive relationship between democracy and terrorism in
support of the strategic school (e.g., Chenoweth 2010, Eubank and Weinberg 1994, 2001, Lai
2007, Li and Schaub 2004, Piazza 2008, and San-Akca 2014). A small number of articles
display a negative relationship, supportive of the political access or democratic protection
schools (e.g., Eyerman 1998). Other articles find no significant relationship (Gassebner and
Luechinger 2011, Krueger and Laitin 2008, and Savun and Phillips 2009).46 A handful of
articles uncover an inverted U-shaped relationship in which some intermediate regime type in
between autocracy and democracy, known as anocracy, displayed the greatest amount of
terrorism (Abadie 2006, Chenoweth 2013, Drakos and Gofas 2006, and Gaibulloev, Piazza, and
Sandler 2017).
The overwhelming number of studies involves panel analyses that do not adequately
address endogeneity concerns regarding regime type and terrorism. Many of these studies either
do not account for unobserved heterogeneities or, when they do, their fixed-effects estimates
typically do not support the articles’ hypotheses. Often, articles examine limited time periods
and a single type of terrorism, leaving one to wonder about the true relationship between regime
type and alternative forms of terrorism.
Unlike the extant literature, Gaibulloev, Piazza, and Sandler (2017) take up these
concerns in their investigation of regime type and terrorism for a global sample during 1970–
2012. They first present a game-theoretic model, accounting for the three schools of thought. In
so doing, they establish theoretic grounds for an inverted U-shaped relationship between forms
of terrorism – transnational and domestic – and alternative measures of regime type.47 This
follows because autocracies employ draconian measures to curb terrorism, while strong 46 Sandler (1995) cautions about the bias from employing terrorist event datasets, collected from the news media, to test this relationship. Autocracies are less likely than democracies, to report small-scale terrorist incidents. There are ways to ameliorate this bias. 47 Also see Dragu (2011) on an inverted U-shaped relationship between security and liberty.
58
democracies also apply effective means to protect lives and property. Moreover, strong
democracies limit terrorism-inducing grievances through political access. In contrast, anocracies
lack the means to respond rigorously to terrorism and only offer intermediate levels of political
access. Along a regime spectrum with autocracies and strong democracies at the endpoints,
anocracies are anticipated to experience the most domestic and transnational terrorism, thus
giving rise to an inverted U-shaped regime-terrorism relationship.
Given the count nature of the terrorism variable, Gaibulloev, Piazza, and Sandler (2017)
employ various estimators for panel count data to test empirically their hypothesis. They
consider an extensive set of controls, consistent with the literature, and present instrumental
variable approaches to address endogeneity concerns. Alternative measures of regime type are
included to capture notions of political rights, civil rights, and political participation. These
authors show that regime type has a robust inverted U-shaped relationship on terrorism. Their
results strongly suggest that the effect of regime type on terrorism is nonlinear and more
complex than initially presupposed by commentators, leaders, and researchers.
This inverted U-shaped finding raises an important policy concern with respect to post-
9/11 efforts to push democracies, culminating in Western democracies supporting the “Arab
Spring.” As autocracies are transformed into fledgling democracies or anocracies, the risk of
greater terrorism surfaces, so that preventive actions must be in place to protect against this risk.
7. Economic Consequences of Terrorism
Terrorists aim to harm the economy of targeted governments in order to induce governments’
concessions to some of the terrorists’ demands. But how damaging is terrorism to a country’s
economy?
59
7.1 Economic Growth and Terrorism
Based on a panel of 177 countries for 1968–2000, Blomberg, Hess, and Orphanides (2004)
uncover a negative and statistically significant effect of transnational terrorism on the growth of
GDP per capita. Terrorism appears to induce a reallocation of resources from productive
investments toward government spending. However, the magnitude of the growth effect of
terrorism is economically modest and substantially smaller than the impact of internal or external
conflicts.48 Their analysis shows that the impact of terrorism on GDP disappears after one year,
which is much shorter-lived relative to the effect of internal and external conflicts. Using a panel
of world countries for 1987–2001, Tavares (2004) also finds that the negative effect of
transnational terrorism on economic growth is quantitatively small. Moreover, the estimated
coefficient for terrorism is not statistically robust across alternative model specifications.
Subsequent studies distinguish between transnational and domestic terrorism and focus
on regional subsamples (e.g., Africa, Asia, and Western Europe).49 Generally, terrorism had a
small adverse effect on the growth of GDP per capita. The effect is driven by transnational
terrorism; domestic terrorism is usually not statistically significant.50
This literature commonly applies dynamic fixed-effects regressions to account for
endogeneity bias that might stem from country-specific unobserved heterogeneities and time-
specific global shocks. However, the issue of endogeneity of terrorism – owing to potential
omission of factors that may influence both terrorism and economic growth – remains a concern.
Given the difficulty of finding a proper instrument, some studies use lagged value of terrorism to
48 A one-unit increase in the number of terrorist attacks per million persons was associated with 0.24 percentage point decrease in GDP per capita growth for the full-sample fixed-effects regression (Blomberg, Hess, and Orphanides 2004, Table 5, p. 1023). The average number of terrorist attacks per million persons was just 0.2 in their sample. 49 See, e.g., Gaibulloev and Sandler (2008, 2009b, 2011). 50 Findings also suggest that less-developed countries were more susceptible to a negative impact of terrorism on growth (e.g., Blomberg, Hess, and Orphanides 2004).
60
ameliorate this issue (e.g., Tavares 2004). Using fixed-effects estimator in dynamic panel
regression leads to Nickel bias. To address this issue, studies focus on longer sample periods and
relatively smaller number of cross-sectional units. In a related study, Gaibulloev, Sandler, and
Sul (2013) find a significant cross-sectional correlation of transnational terrorism across 106
countries. Gaibulloev, Sandler, and Sul (2014) show that the negative, albeit small, impact of
terrorism on growth is not robust: once Nickell bias and cross-sectional dependence are corrected
in dynamic panel regressions, the coefficient for terrorism loses its statistical significance.
With few exceptions, the literature does not distinguish between the pre-1990s and the
post-1990s periods in terms of the effect of terrorism on growth. For Asia, Gaibulloev and
Sandler (2009b) find that terrorism is not statistically significant for the period before 1986 but is
statistically significant and negative for 1986–2004.
The adverse effect of terrorism on growth can be substantial for an individual country or
subregion plagued with terrorist incidents. Abadie and Gardeazabal (2003) introduce an
innovative econometric method – synthetic control approach – to obtain the causal effect of
terrorism on the economy of the Basque Country.51 This method addresses identification
challenges that arise in cross-country panel regressions. They show that terrorism reduced GDP
per capita in the Basque Country by about 10 percentage points during the 1980s and 1990s.
These authors further demonstrate that the 1998–1999 cease-fire caused a substantial
improvement in the relative performance of the stocks portfolio of firms with large business
dealings in the Basque region (value increase of 10.4%) when the truce became credible. The
abnormal return of Basque stocks relative to non-Basque stocks was negative and large (–11.2%)
51 The basic idea is to construct a “synthetic” Basque Country using a weighted combination of the other regions in Spain so that the “synthetic” and real Basque Country are closely matched in terms of their economic characteristics before the onset of terrorism. Assuming that the economic trajectories of “synthetic” Basque Country and the Basque Country are similar in the absence of terrorism, any differences in the outcome variable after the outbreak of terrorism in the Basque Country is attributed to the casual effect of terrorism.
61
at the end of the truce period. A case study of Israel also indicates a sizable impact of terrorism
on per capita output during high terrorism periods (Eckstein and Tsiddon 2004).
7.2 Trade and Terrorism
In general, the empirical research on terrorism and trade finds a negative relationship between
terrorism and bilateral trade.52 Presumably, trade falls owing to greater cost of doing business –
e.g., greater uncertainty, higher insurance and wage premiums, and larger transaction costs. The
literature usually utilizes the gravity model, which is the standard in the empirical trade
literature. The adverse effect of terrorism on trade is shown for the period of the dominance by
the leftist terrorist groups (e.g., Nitsch and Schumacher 2004) as well as for the era of the
dominance by the religious fundamentalist terrorists (e.g., Bandyopadhyay, Sandler, and Younas
2018). Egger and Gassebner (2015) is an exception; they discern a negligible nonrobust effect of
terrorism on trade in the short run. They attribute the differences in their findings to the neglect
of aggregation bias and general equilibrium effects by previous studies. Although most work on
terrorism and trade use transnational terrorism data, recent evidence suggests that domestic
terrorism also reduced bilateral trade. For example, Bandyopadhyay, Sandler, and Younas
(2018) disaggregate bilateral trade data into primary commodities and manufactured goods for a
panel of 151 countries during 1995–2012 and find a detrimental impact of both domestic and
transnational terrorism on trade, particularly on the trade of manufactured goods.53 Overall,
terrorism had a considerable smaller effect on trade relative to other types of violence, such as
52 See, e.g., Blomberg and Hess (2006), De Sousa, Mirza, and Verdier (2009), and Mirza and Verdier (2014). These studies apply gravity trade models using panel data. De Sousa, Mirza, and Verdier (2009) examine the spatial spillover effect of terrorism and find that a country’s export to the United States was adversely affected by terrorism in neighboring countries. 53 Nitsch and Schumacher (2004) estimate the elasticity of total trade in response to transnational terrorism to be around –0.04 using pre-2001 data. Blomberg and Hess (2006) use a dummy variable for terrorism: if a country-pair experienced terrorism in a given year, trade fell by about 5%.
62
civil war (e.g., Blomberg and Hess 2006).
7.3 Stock Exchanges and Terrorism
Chen and Siems (2004) implement the event-study methodology to examine the effect of
terrorist attacks on global capital markets. An analysis of 14 military/terrorist events for 1915–
2001 reveals that, over time, the US capital markets became more resilient and faster in
absorbing the effects of such shocks.54 US markets displayed a remarkable resilience to the 9/11
terrorist attacks. The decline in the US stock market, though significant, was the second smallest
among the 10 largest capital markets in the world. The Dow Jones Industrial Average stock
index took 40 trading days to fully recover its losses.
Chen and Siems’ (2004) analysis illustrates that a large terrorist attack could have a
sizable effect on financial markets, but the impact was transitory; markets absorbed the shock
and continued to function efficiently. Within 60 trading days of 9/11, 27 of the 33 markets
(82%) in their sample recouped their losses. The length and the depth of the terrorism shock
depended on the size and the maturity of the markets and the strength of institutions. Stable
banking/financial sector and prudent government policies can mitigate the adverse effect of
terrorism by providing necessary liquidity (and fiscal stimulus) as shown in the case of the
United States (Enders and Sandler 2012). This also implies that developing markets are more
vulnerable to terrorism. In fact, Arin, Ciferri, and Spagnolo (2008) compare six financial
markets and record a greater effect of terrorism on stock returns and stock volatility in emerging
markets.
Terrorism has a dissimilar effect on stocks both across countries and industries. Chesney, 54 Out of eight terrorist attacks in the sample, only the 9/11 attacks had a significant impact on the Dow Jones Industrial average stock index. The Air India bombing in 1985 had a marginally significant impact only on the day of the event. The other terrorist incidents, which include the US Embassy bombing in Kenya in 1998 and the World Trade Center bombing in 1993, did not have a statistically significant effect.
63
Reshetar, and Karaman (2011) employ various empirical methodologies, including event-study
and non-parametric approaches, to compare the effects of 77 major terrorist events, 4 financial
crashes, and 19 natural disasters for 1994–2005 on global and regional stock markets and
industry stock indices. About two-thirds of the sample terrorist attacks had a significant adverse
impact on at least one of the studied stock markets. The American (Swiss) market is found to be
most (least) immune to the negative shock of terrorism. Similarly, the majority of the sample
terrorist events had a significant impact on at least one of the studied industry indices. However,
these authors do not examine why a given stock market or industry stock index reacted
differently to individual terrorist events. Chesney, Reshetar, and Karaman (2011) uncover
interesting similarities and differences between three types of shocks – terrorism, financial crises,
and natural disasters – in terms of their effect on industry indices. For example, terrorism had a
strong adverse effect on the stocks of airline.55 In contrast, the banking sector was most
vulnerable to financial crises. The impact of terrorism, similar to financial crises, was strongest
during an event-day but decayed in the post-event period.
7.4 Direct and Indirect Costs of Large-Scale Terrorist Incidents
Available estimates suggest that the direct economic cost of large-scale terrorist incidents is
modest, particularly for advanced economies. According to Kunreuther, Michel-Kerjan, and
Porter (2003) the damage from the 9/11 terrorist attacks was more than $80 billion for the United
States. Similarly, the estimated direct cost of the March 11, 2004 terrorist attacks in Madrid,
Spain, was around 212 million euros, which was about 0.03% of Spain’s GDP (Buesa et al.
2007). As pointed out by Becker and Murphy (2001), diversified economies adjust and
55 Drakos (2004) discerns a substantial increase in both systematic and idiosyncratic risks of the airline stocks as a result of 9/11.
64
withstand large-scale attacks with a small number of key sectors affected. They estimate the cost
of the ongoing threat following 9/11 to be around 0.3% of the US GDP.56 However, indirect
economic costs of terrorist attacks, which are difficult to measure, are likely to be substantial.57
7.5 Tourism and Terrorism
The tourism sector is particularly vulnerable to terrorism. Enders, Sandler, and Parise (1992)
examine the impact of terrorist events on tourism receipts in Western European nations using
quarterly data for 1970–1988. Using an ARIMA method with transfer function, these authors
find that terrorism reduced tourism revenue. However, the effect was heterogeneous: Austria,
Greece, and Italy suffered significant losses in tourism receipts but France, Denmark, and
Germany did not experience statistically significant losses. Further, there was evidence for a
negative externality; terrorist incidents in a country dissuaded tourist visitors in neighboring
countries. A number of ensuing studies examine an individual country, a region, and a world
sample for either the 1970s–2000s or the post-1990s period; they confirm that terrorism
adversely influences tourism.58 Overall, the short-run effect of terrorism on tourism can be large
but the impact faded quickly with airline discount fares. Nevertheless, for countries that rely on
tourism for a source of foreign exchange, sustained terrorist campaigns can be detrimental to the
economy.
Recent studies point toward a significant spillover effect from terrorism. Drakos and
Kutan (2003) uncover a negative association between terrorist incidents and the number of
tourists that used three Mediterranean tourist destinations – Greece, Israel, and Turkey – from
56 They assume one successful attack annually that downs one plane and kills up to 100 people. The estimated cost includes air travel security, loss of human life, physical damage, and reduced GDP growth. 57 See Frey, Luechinger, and Stutzer (2009) for estimates of the psychological cost of terrorism. 58 See, e.g., Neumayer (2004), Pizam and Fleischer (2002), and Sloboda (2003). Ito and Lee (2005) report a significant immediate drop of 30% in demand for US airline as a result of 9/11 attacks.
65
January 1991 to December 2000. As the intensity of attacks increased in a country, the number
of tourists fell, causing the country to lose market share. The tourists either chose another
country in the region (substitution effect) or left the region in favor of safer destinations (regional
effect). The latter effect is estimated to be substantially greater than the substitution effect for
the sample countries. Neumayer and Plümper (2016) distinguish three types of statistically
significant spillover effects arising from transnational terrorist campaigns in Islamic countries. 59
A terrorist attack against a Westerner in an Islamic country deterred the flow of tourists from the
victim’s country to other Islamic countries. Furthermore, the attack discouraged tourists from
other Western countries to both the targeted Islamic country and other Islamic destination
nations.
7.6 Foreign Direct Investment and Terrorism
International investors consider countries’ risk ratings, including terrorist risk, in their
investment decisions. Terrorist risk reduces the expected return to investment and creates
uncertainty about possible future terrorist incidents (Abadie and Gardeazabal 2008). Therefore,
in an open economy, mobility of productive resources results in the reallocation of investments
from countries with higher level of terrorism to those with small levels of attacks. For a sample
of 78 developing countries over 1984–2008, Bandyopadhyay, Sandler, and Younas (2014)
uncover a negative association between both transnational and domestic terrorist incidents and
foreign direct investment (FDI). The specification challenges discussed in Section 7.1 apply to
FDI regressions as well. Bandyopadhyay, Sandler, and Younas (2014) implement Dynamic
GMM method to address the Nickel bias and endogeneity problems. The majority of studies use
59 They use a dyadic data of world countries for 1995–2013. The regression model is specified following a gravity-type model, which is well-suited to explain the dyadic relationship.
66
terrorist incidents and casualties; however, Abadie and Gardeazabal (2008) take advantage of a
unique data on terrorist risk across 186 countries for 2003/2004. Their cross-sectional analysis
reveals that the net FDI position of an average country fell by about 5% of GDP in response to a
one standard deviation increase in the terrorist risk, which is a large shock. These authors
provide numerous robustness checks to eliminate potential sources of the omitted variable bias
and argue that a potential reverse causation is not expected to weaken their result.
In general, the available evidence suggests that terrorism depressed FDI both before 1990
(e.g., Enders and Sandler 1996) and after 1990, but the magnitude of the effect depends on the
size of the economy and the severity of terrorism.60 Generally, the effect is small in relation to
the size of the economy, especially because an average country experiences very little
transnational terrorism.
8. Concluding Remarks
To conclude this study, we return to address the questions posed at the outset.
Over the last half century, transnational and domestic terrorism changed in a few
essential ways. First, the number of transnational terrorist incidents fell by about 40% since the
start of the 1990s; however, each incident was much more likely to involve casualties since then.
Second, domestic terrorism displayed a somewhat similar pattern: it rose until 1992 and then fell
before rising abruptly after 2008. After 9/11, transnational and domestic terrorists shifted their
venue from Europe, Central Asia, and Latin America to the Middle East, Africa, and South Asia.
Some of this displacement is due to defensive measures taken by industrial countries following
60 Using quarterly data for 1975–1991, Enders and Sandler (1996) find that the annual number of terrorist incidents in Spain (Greece) reduced Spanish (Greek) annual net FDI by 13.5% (11.9%). A panel analysis of 69 countries for 1989–1999 suggests that attacks against US interests abroad had a small effect on the stock of US FDI in the OECD countries but had no effect on the stock of US FDI in the non-OECD countries (Enders, Sachsida, and Sandler 2006).
67
9/11. Third, during the post-9/11 era, terrorists relied more heavily on hostage taking and armed
attacks. The former provided funding that was reduced by post-9/11 actions.
Religious fundamentalist groups, which represent the dominant terrorist influence for the
last 25 years, rely on kinship, long-term friendships, and worship for recruitment. Some of these
groups tighten their grip on members by supplying excludable club goods to operatives (Berman
2009). Backlash to governments’ crackdowns can also attract recruits, as can highly visible
spectacular terrorist attacks, even when unsuccessful. The literature on terrorist group shows
that religious fundamentalist groups display long-term survival, fostered by group size and
cooperative links with other terrorist groups. Islamic terrorist groups are particularly resilient.
Groups that rely less on transnational terrorist attacks possess better survival prospects by not
angering a formidable targeted state. Terrorist groups foster their survivability by responding
rationally to government countermeasures.
Studies of counterterrorism effectiveness offer a rather mixed picture. Technological
barriers are effective provided that they are constantly updated, so that they stay ahead of
terrorist-designed circumventions. In addition, authorities must anticipate attack, target, and
location transference that barriers and other defenses encourage. For transnational terrorism,
defensive measures tend to be overprovided, while proactive measures tend to be underprovided,
so that targeted governments work at cross-purposes with one another. Thus, international
cooperation has the potential of achieving the right balance of these measures against a common
terrorist threat by internalizing a host of opposing externalities. Unfortunately, even after 9/11,
the extent of such cooperation is rather limited as targeted countries cherish their autonomy over
security matters. At the domestic level, the right mix of defensive and proactive measures is
generally struck as a central government internalizes externalities between alternative venues and
targets. Berman (2009) offers a novel counterterrorism approach against Islamic fundamentalist
68
terrorists that involves government provision of services to counter monopoly provision of these
services by some religious fundamentalist groups. The literature also shows that directed
proactive measures – e.g., assassination of militant leaders or house demolitions – are effective
(Benmelech, Berrebi, and Klor 2015 and Zussman and Zussman 2006).
Following 9/11, the media, some heads of state, and academics put forward three causes
or facilitators of terrorism: globalization, poverty, and democracy. To date, the literature finds
no evidence of a relationship between terrorism and globalization. A similar story holds for
poverty. Any relationship between GDP per capita and terrorism is highly nonlinear with some
intermediate level of income being most associated with transnational and domestic terrorism.
Operationally, terrorist leaders prefer to deploy well-educated operatives, even for suicide
missions, because they are likely to succeed (Benmelech and Berrebi 2007). Moreover,
anocracies, not democracies, provide the most favorable environment for terrorism because
political access is limited, many terrorism-facilitating freedoms are present, and lives and
property are not well-protected. The alleged relationships between GDP per capita and terrorism
and between regime type and terrorism are more subtle than originally presupposed.
Despite the damage wreaked by 9/11, most terrorist attacks have little impact on property
and people on average. For large-scale terrorist attacks, economic and financial ramifications are
transitory. Most countries sustain very few terrorist attacks annually so that terrorism generally
has little or no influence on GDP per capita growth. Rich diversified countries are able to absorb
these attacks with little macroeconomic consequences; however, terrorism-plagued small or
developing countries are adversely affected in terms of lost GDP. Losses in terrorism-prone
sectors (e.g., tourism and FDI) may be measurable but relatively small compared to GDP for
most countries. Rich diversified economies naturally cushion these sectoral impacts by
transference as activities move to less terrorism-risky parts of a targeted country’s economy.
69
There are clear directions for future research on terrorism. Empirical analyses on aspects
of terrorism must pay greater heed to their identification strategy. Panel studies on terrorism
determinants need to do more than lag some control variables to account for endogeneity. Given
the rise of homegrown terrorist attacks by Islamic extremist groups, research must consider the
radicalization process and subsequent attacks. To assist this research, terrorist event datasets
should record whether attacks are inspired by foreign influences and radicalization. Currently,
group level data that are cleaned and tied to an event dataset ends in 2006. Such data must be
brought up-to-date to investigate how diverse terrorist ideologies influence groups’ survival and
their response to counterterrorism. In particular, this expanded data on terrorist groups will
foster more informative studies on the determinants of alternative ways that these groups end in
the post-9/11 era. Attention must be paid to how micro-level studies of particular terrorist
campaigns add to our general knowledge of terrorism. For instance, do micro-level studies of
Israel or Iraq inform us about terrorist campaigns in other places where different conditions
apply? Also, the relationship between immigration and terrorism warrants careful study.
Finally, empirical analyses of terrorist behavior must account for more competing choices.
70
References
Abadie, Alberto. 2006. “Poverty, Political Freedom and the Roots of Terrorism.” American
Economic Review 96 (2): 50–6.
Abadie, Alberto and Javier Gardeazabal. 2003. “The Economic Cost of Conflict: A Case Study
of the Basque Country.” American Economic Review 93 (1): 113–32.
Abadie, Alberto and Javier Gardeazabal. 2008. “Terrorism and the World Economy.”
European Economic Review 52 (1): 1–27.
Abrahms, Max. 2006. “Why Terrorism Does Not Work.” International Security 31 (2): 42–78.
Abrahms, Max. 2008. “What Terrorists Really Want: Terrorist Motives and Counterterrorism
Strategy.” International Security 32 (4): 78–105.
Anderton, Charles H. and John R. Carter. 2005. “On Rational Choice Theory and the Study of
Terrorism.” Defence and Peace Economics 16 (4): 275–82.
Arce, Daniel G., Rachel T. A. Croson, and Catherine C. Eckel. 2011. “Terrorism Experiments.”
Journal of Peace Research 48 (3): 373–82.
Arce, Daniel G. and Todd Sandler. 2005. “Counterterrorism: A Game-Theoretic Analysis.”
Journal of Conflict Resolution 49 (2): 183–200.
Arce, Daniel G. and Todd Sandler. 2007. “Terrorist Signalling and the Value of Intelligence.”
British Journal of Political Science 37 (4): 573–86.
Arce, Daniel G. and Todd Sandler. 2010. “Terrorist Spectaculars: Backlash Attacks and the
Focus of Intelligence.” Journal of Conflict Resolution 54 (2): 354–73.
Arce, Daniel G. and Kevin Siqueira. 2014. “Motivating Operatives for Suicide Missions and
Conventional Terrorist Attacks.” Journal of Theoretical Politics 26 (4): 677–95.
Arin, Peren K., Davide Ciferri, and Nicola Spagnolo. 2008. “The Price of Terror: The Effects
of Terrorism on Stock Market Returns and Volatility.” Economics Letters 101 (3): 164–
71
7.
Asworth, Scott, Joshua D. Clinton, Adam Meirowitz, and Kristopher W. Ramsey. 2008.
“Design, Inference, and the Strategic Logic of Suicide Terrorism.” American Political
Science Review 102 (2): 267–72.
Atkinson, Scott E., Todd Sandler, and John Tschirhart. 1987. “Terrorism in a Bargaining
Framework.” Journal of Law and Economics 30 (1): 1–21.
Azam, Jean-Paul. 2005. “Suicide-Bombing as Inter-Generational Investment.” Public Choice
122 (1–2): 177–98.
Azam, Jean-Paul and Alexandra Delacroix. 2006. “Aid and the Delegated Fight against
Terrorism.” Review of Development Economics 10 (2): 330–44.
Azam, Jean-Paul and Véronique Thelen. 2008. “The Roles of Foreign Aid and Education in the
War on Terror.” Public Choice 135 (3–4): 375–97.
Azam, Jean-Paul and Véronique Thelen. 2010. “Foreign Aid versus Military Intervention in the
War on Terror.” Journal of Conflict Resolution 54 (2): 237–61.
Bandyopadhyay, Subhayu and Todd Sandler. 2011. “The Interplay between Preemptive and
Defensive Counterterrorism Measures: A Two-Stage Game.” Economica 78 (3): 546–
64.
Bandyopadhyay, Subhayu and Todd Sandler. 2014. “Immigration Policy and
Counterterrorism.” Journal of Public Economics 110: 112–23.
Bandyopadhyay, Subhayu, Todd Sandler, and Javed Younas. 2011. “Foreign Aid as
Counterterrorism Policy.” Oxford Economic Papers 63 (3): 423–47.
Bandyopadhyay, Subhayu, Todd Sandler, and Javed Younas. 2014. “Foreign Direct Investment,
Aid, and Terrorism.” Oxford Economic Papers 66 (1): 25–50.
Bandyopadhyay, Subhayu, Todd Sandler, and Javed Younas. 2018. “Trade and Terrorism: A
72
Disaggregated Approach.” Journal of Peace Research 55 ( ): DOI:
10.1177/0022343318763009, forthcoming..
Bandyopadhyay, Subhayu and Javed Younas. 2011. “Poverty, Political Freedom, and the Roots
of Terrorism in Developing Countries: An Empirical Assessment.” Economics Letters
112 (2): 171–76.
Bapat, Navin A. 2007. “The Internationalization of Terrorist Campaigns.” Conflict
Management and Peace Science 24 (4): 265–80.
Bapat, Navin A. 2011. “Transnational Terrorism, US Military Aid, and the Incentive to
Misrepresent.” Journal of Peace Research 48 (3): 303–18.
Basile, Mark. 2004. “Going to the Source: Why Al Qaida’s Financial Network is Likely to
Withstand the Current War on Terrorist Financing.” Studies in Conflict & Terrorism 27
(3): 169–85.
Becker, Gary S. and Kevin M. Murphy. 2001. “Prosperity Will Rise Out of the Ashes?” Wall
Street Journal (Eastern ed.), 29 October 2001: A.22.
Benmelech, Efraim and Claude Berrebi. 2007. “Human Capital and the Productivity of Suicide
Bombers.” Journal of Economic Perspectives 21 (2): 223–38.
Benmelech, Efraim, Claude Berrebi, and Esteban F. Klor. 2012. “Economic Conditions and the
Quality of Suicide Terrorism.” Journal of Politics 74 (1): 113–28.
Benmelech, Efraim, Claude Berrebi, and Esteban F. Klor. 2015. “Counter-Suicide-Terrorism:
Evidence from House Demolitions.” Journal of Politics 77 (1): 27–43.
Berman, Eli. 2000. “Sect, Subsidy and Sacrifice: An Economist’s View of Ultra-Orthodox
Jews.” Quarterly Journal of Economics 115 (3): 905–53.
Berman, Eli. 2009. Radical, Religious, and Violent: The New Economics of Terrorism.
Cambridge, MA: The MIT Press.
73
Berman, Eli and David D. Laitin. 2008. “Religion, Terrorism, and Public Clubs: Testing the
Club Model.” Journal of Public Economics 92 (9–10): 1942–67.
Berman, Eli, Jacob N. Shapiro, and Joseph H. Felter. 2011. “Can Hearts and Minds Be Bought?
The Economics of Counterinsurgency in Iraq.” Journal of Political Economy 119 (4):
766–819.
Berrebi, Claude and Esteban F. Klor. 2006. “On Terrorism and Electoral Outcome: Theory and
Evidence from the Israeli-Palestinian Conflict.” Journal of Conflict Resolution 50 (6):
899–925.
Berrebi, Claude and Darius Lakdawalla. 2007. “How Does Terrorism Risk Vary Across Space
and Time? An Analysis Based on Israeli Experience.” Defence and Peace Economics 18
(2): 113–31.
Bier, Vicki, Santiago Oliveros, and Larry Samuelson. 2007. “Choosing What to Protect:
Strategic Defensive Allocation against an Unknown Attacker.” Journal of Public
Economic Theory 9 (4): 563–87.
Blomberg, S. Brock, Rozlyn C. Engel, and Reid Sawyer. 2010. “On the Duration and
Sustainability of Transnational Terrorist Organizations.” Journal of Conflict Resolution
54 (2): 303–30.
Blomberg, S. Brock, Khusrav Gaibulloev, and Todd Sandler. 2011. “Terrorist Group Survival:
Ideology, Tactics, and Base of Operations.” Public Choice 149 (3–4): 441–63.
Blomberg, S. Brock and Gregory D. Hess. 2006. “How Much Does Violence Tax Trade?”
Review of Economics and Statistics 88 (4): 599–612.
Blomberg, S. Brock, Gregory D. Hess, and Athanasios Orphanides. 2004. “The Macroeconomic
Consequences of Terrorism.” Journal of Monetary Economics 51 (5): 1007–32.
Blomberg, S. Brock, Gregory D. Hess, and Akila Weerapana. 2004. “Economic Conditions and
74
Terrorism.” European Journal of Political Economy 20 (2): 463–78.
Bloom, Mia. 2005. Dying to Kill: The Allure of Suicide Terror. New York: Columbia
University Press.
Brandt, Patrick T., Justin George, and Todd Sandler. 2016. “Why Concessions Should Not Be
Made to Terrorist Kidnappers.” European Journal of Political Economy 44: 41–52.
Brandt, Patrick T. and Todd Sandler. 2009. “Hostage Taking: Understanding Terrorism Event
Dynamics.” Journal of Policy Modeling 31 (5): 758–78.
Brandt, Patrick T. and Todd Sandler. 2010. “What Do Transnational Terrorists Target? Has It
Changed? Are We Safer?” Journal of Conflict Resolution 54 (2): 214–36.
Brandt, Patrick T. and Todd Sandler. 2012. “A Bayesian Poisson Vector Autoregression
Model.” Political Analysis 20 (3): 292–315.
Brock, William A., Steven N. Durlauf, and Kenneth D. West. 2003. “Policy Evaluation in
Uncertain Economic Environments.” Brookings Papers on Economic Activity 2003 (1):
235–301.
Brophy-Baermann, Bryan and John A. C. Conybeare. 1994. “Retaliating against Terrorism:
Rational Expectations and the Optimality of Rules versus Discretion.” American Journal
of Political Science 38 (1): 196–210.
Bueno de Mesquita, Ethan. 2005a. “Conciliation, Commitment and Counterterrorism: A
Formal Model.” International Organization 59 (1): 145–76.
Bueno de Mesquita, Ethan. 2005b. “The Quality of Terror.” American Journal of Political
Science 49 (3): 515–30.
Bueno de Mesquita, Ethan. 2007. “Politics and the Suboptimal Provision of Counterterror.”
International Organization 61 (1): 9–36.
Bueno de Mesquita, Ethan. 2013. “Rebel Tactics.” Journal of Political Economy 121 (2): 323–
75
57.
Buesa, Mikel, Aurelia Valiño, Joost Heijs, Thomas Baumert, and Javier González Gómez. 2007.
“The Economic Cost of March 11: Measuring Direct Economic Cost of the Terrorist
Attack on March 11, 2004 in Madrid.” Terrorism and Political Violence 19 (4): 489–
509.
Bush, George W. 2002. Securing the Homeland: Strengthening the Nation. Washington, DC:
White House.
Cárceles-Poveda, Eva and Yair Tauman. 2011. “A Strategic Analysis of the War against
Transnational Terrorism.” Games and Economic Behavior 74 (1): 49–65.
Carter, David B. 2010. “The Strategy of Territorial Conflict.” American Journal of Political
Science 54 (4): 969–87.
Carter, David B. 2012. “A Blessing or Curse? State Support for Terrorist Groups.”
International Organization 66 (1): 129–51.
Carter, David B. 2015a. “When Terrorism Is Evidence of State Success: Securing the State
against Territorial Groups.” Oxford Economic Papers 67 (1): 116–32.
Carter, David B. 2015b. “The Compellence Dilemma: International Disputes with Violent
Groups.” International Studies Quarterly 59 (3): 461–76.
Carter, David B. 2016. “Provocation and the Strategy of Terrorist and Guerrilla Attacks.”
International Organization 70 (1): 133–73.
Chen, Andrew H. and Thomas F. Siems. 2004. “The Effects of Terrorism on Global Capital
Markets.” European Journal of Political Economy 20 (2): 249–66.
Chenoweth, Erica. 2010. “Democratic Competition and Terrorist Activity.” Journal of Politics
72 (1): 16–30.
Chenoweth, Erica. 2013. “Terrorism and Democracy.” Annual Review of Political Science 16
76
(1): 355–78.
Chesney, Marc, Ganna Reshetar, and Mustafa Karaman. 2011. “The Impact of Terrorism on
Financial Markets: An Empirical Study.” Journal of Banking & Finance 35 (2): 253–67.
Conrad, Justin and Kevin Greene. 2015. “Competition, Differentiation, and the Severity of
Terrorist Attacks.” Journal of Politics 77 (2): 546–61.
Cornes, Richard and Todd Sandler. 1996. The Theory of Externalities, Public Goods, and Club
Goods, 2nd ed. Cambridge: Cambridge University Press.
Crenshaw, Martha. 1981. “The Causes of Terrorism.” Comparative Politics 13 (4): 379–99.
Cronin, Audrey K. 2006. “How al-Qaida Ends: The Decline and Demise of Terrorist Groups.”
International Security 31 (1): 7–48.
Das, Satya. 2008. “Some Mechanisms of Terror Cycles.” Journal of Economic Behavior and
Organization 67 (3–4): 644–56.
Davis, Darren W. and Brian D. Silver. 2004. “Civil Liberties vs. Security: Public Opinion in
the Context of the Terrorist Attacks on America.” American Journal of Political Science
48 (1): 38–46.
Daxecker, Ursula E. and Michael L. Hess. 2013. “Repression Hurts: Coercive Government
Responses and the Demise of Terrorist Campaigns.” British Journal of Political Science
43 (3): 559–77.
de la Calle, Luis and Ignacio Sánchez-Cuenca. 2012. “Rebels without a Territory: An Analysis
of Nonterritorial Conflicts in the World, 1970–1977.” Journal of Conflict Resolution 56
(4): 580–603.
Department of Homeland Security (DHS). 2016. Budget in Brief: Fiscal Year 2017. Available
at https: https://www.dhs.gov/sites/default/files/publications/FY2017BIB.pdf (Accessed
November 12, 2017).
77
De Sousa, José, Daniel Mirza, and Thierry Verdier. 2009. “Trade and the Spillovers of
Transnational Terrorism.” Swiss Journal of Economics and Statistics 145 (4): 453–61.
Dragu, Tiberiu. 2011. “Is There a Trade-Off between Security and Liberty? Executive Bias,
Privacy Protections, and Terrorism Prevention.” American Political Science Review 105
(1): 64–78.
Drakos, Konstantinos. 2004. “Terrorism-Induced Structural Shifts in Financial Risk: Airline
Stocks in the Aftermath of the September 11th Terror Attacks.” European Journal of
Political Economy 20 (2): 436–46.
Drakos, Konstantinos and Andreas Gofas. 2006. “In Search of the Average Transnational
Terrorist Attack Venue.” Defence and Peace Economics 17 (2): 73–93.
Drakos, Konstantinos and Ali M. Kutan. 2003. “Regional Effects of Terrorism on Tourism in
Three Mediterranean Countries.” Journal of Conflict Resolution 47 (5): 621–41.
Dreher, Axel. 2006. “Does Globalization Affect Growth? Empirical Evidence from a New
Index.” Applied Economics 38 (10): 1091–110.
Dreher, Axel and Justin A. V. Fischer. 2010. “Government Decentralization as a Disincentive
for Transnational Terror? An Empirical Analysis.” International Economic Review 51
(4): 981–1002.
Dreher, Axel and Andreas Fuchs. 2011. “Does Terror Increase Aid?” Public Choice 149 (3–4):
337–63.
Dugan, Laura and Erica Chenoweth. 2012. “Moving beyond Deterrence: The Effectiveness of
Raising the Expected Utility of Abstaining from Terrorism in Israel.” American
Sociological Review 77 (4): 597–624.
Eckstein, Zvi and Daniel Tsiddon. 2004. “Macroeconomic Consequences of Terror: Theory
and the Case of Israel.” Journal of Monetary Economics 51 (5): 971–1002.
78
Egger, Peter and Martin Gassebner. 2015. “International Terrorism as a Trade Impediment?”
Oxford Economic Papers 67 (1): 42–62.
Enders, Walter and Gary A. Hoover. 2012. “The Nonlinear Relationship between Terrorism and
Poverty.” American Economic Review 102 (3): 267–72.
Enders, Walter, Gary A. Hoover, and Todd Sandler. 2016. The Changing Nonlinear
Relationship between Income and Terrorism.” Journal of Conflict Resolution 60 (2):
195–225.
Enders, Walter and Paan Jindapon. 2010. “Network Externalities and the Structure of Terror
Networks.” Journal of Conflict Resolution 54 (2): 262–80.
Enders, Walter, Adolfo Sachsida, and Todd Sandler. 2006. “The Impact of Transnational
Terrorism on U.S. Foreign Direct Investment.” Political Research Quarterly 59 (4):
517–31.
Enders, Walter and Todd Sandler. 1993. “The Effectiveness of Anti-Terrorism Policies: A
Vector-Autoregression-Intervention Analysis.” American Political Science Review 87
(4): 829–44.
Enders, Walter and Todd Sandler. 1996. “Terrorism and Foreign Direct Investment in Spain
and Greece.” Kyklos 49 (3): 331–52.
Enders, Walter and Todd Sandler. 1999. “Transnational Terrorism in the Post-Cold War Era.”
International Studies Quarterly 43 (2): 145–67.
Enders, Walter and Todd Sandler. 2000. “Is Transnational Terrorism Becoming More
Threatening? A Time-Series Investigation.” Journal of Conflict Resolution 44 (3): 307–
32.
Enders, Walter and Todd Sandler. 2002. “Patterns of Transnational Terrorism, 1970–99:
Alternative Time Series Estimates.” International Studies Quarterly 46 (2): 145–65.
79
Enders, Walter and Todd Sandler. 2004. “What Do We Know about the Substitution Effect in
Transnational Terrorism.” In Researching Terrorism: Trends, Achievements, Failures,
edited by Andrew Silke, 119–37. Ilford, UK: Frank Cass.
Enders, Walter and Todd Sandler. 2005a. “After 9/11: Is It All Different Now?” Journal of
Conflict Resolution 49 (2): 259–77.
Enders, Walter and Todd Sandler. 2005b. “Transnational Terrorism 1968–2000: Thresholds,
Persistence, and Forecasts.” Southern Economic Journal 71 (3): 467–82.
Enders, Walter and Todd Sandler. 2006. “Distribution of Transnational Terrorism among
Countries by Income Classes and Geography after 9/11.” International Studies Quarterly
50 (2): 367–93.
Enders, Walter and Todd Sandler. 2011. “Who Adopts MIND/FIND in INTERPOL’s Fight
against International Crime and Terrorism?” Public Choice 149 (3–4): 263–80.
Enders, Walter and Todd Sandler. 2012. The Political Economy of Terrorism, 2nd ed. New
York: Cambridge University Press.
Enders, Walter, Todd Sandler, and Jon Cauley. 1990. “UN Conventions, Technology, and
Retaliation in the Fight against Terrorism: An Econometric Evaluation.” Terrorism and
Political Violence 2 (1): 83–105.
Enders, Walter, Todd Sandler, and Khusrav Gaibulloev. 2011. “Domestic Versus Transnational
Terrorism: Data, Decomposition, and Dynamics.” Journal of Peace Research 48 (3):
355–71.
Enders, Walter, Todd Sandler, and Gerald F. Parise. 1992. “An Econometric Analysis of the
Impact of Terrorism on Tourism.” Kyklos 45 (4): 531–54.
Enders, Walter and Xuejuan Su. 2007. “Rational Terrorists and Optimal Network Structure.”
Journal of Conflict Resolution 51 (1): 33–57.
80
Engene, Jan O. 2007. “Five Decades of Terrorism in Europe: The TWEED dataset.” Journal
of Peace Research 44 (1): 109–21.
Eubank, William L. and Leonard B. Weinberg. 1994. “Does Democracy Encourage
Terrorism?” Terrorism and Political Violence 6 (4): 417–35.
Eubank, William L. and Leonard B. Weinberg. 2001. “Terrorism and Democracy: Perpetrators
and Victims.” Terrorism and Political Violence 13 (1): 155–64.
Eyerman, Joe. 1998. “Terrorism and Democratic States: Soft Targets or Accessible Systems?”
International Interactions 24 (2): 151–70.
Fair, C. Christine. 2010. “Drone Wars.” Available at
http://foreignpolicy.com/2010/05/28/drone-wars-2 (Accessed on November 8, 2017).
Faria, João R. 2003. “Terror Cycles.” Studies in Nonlinear Dynamics and Econometrics 7 (1):
1–11.
Faria, João R. and Daniel G. Arce. 2005. “Terror Support and Recruitment.” Defence and
Peace Economics 16 (4): 263–73.
Fearon, James D. and David D. Laitin. 2003. “Ethnicity, Insurgency, and Civil War.” American
Political Science Review 97 (1): 75–90.
Feinstein, Jonathan S. and Edward H. Kaplan. 2010. “Analysis of a Strategic Terror
Organization.” Journal of Conflict Resolution 54 (2): 281–302.
Findley, Michael E. and Joseph K. Young. 2012. “Terrorism and Civil War: A Spatial and
Temporal Approach to a Conceptual Problem.” Perspectives on Politics 10 (2): 285–305.
Fleck, Robert K. and Christopher Kilby. 2010. “Changing Aid Regimes? US Foreign Aid from
the Cold War to War on Terror.” Journal of Development Economics 91 (1): 185–97.
Frey, Bruno S. and Simon Luechinger. 2003. “How to Fight Terrorism: Alternatives to
Deterrence.” Defence and Peace Economics 14 (4): 237–49.
81
Frey, Bruno S., Simon Luechinger, and Alois Stutzer. 2009. “The Life Satisfaction Approach to
Valuing Public Goods: The Case of Terrorism.” Public Choice 138 (3–4): 317–45.
Gaibulloev, Khusrav. 2015. “Terrorist Group Location Decision: An Empirical Investigation.”
Oxford Economic Papers 67 (1): 21–41.
Gaibulloev, Khusrav, James A. Piazza, and Todd Sandler. 2017. “Regime Types and
Terrorism.” International Organization 71 (3), 491–522.
Gaibulloev, Khusrav and Todd Sandler. 2008. “Growth Consequences of Terrorism in Western
Europe.” Kyklos 61 (3): 411–24.
Gaibulloev, Khusrav and Todd Sandler. 2009a. “Hostage Taking: Determinants of Terrorist
Logistical and Negotiation Success.” Journal of Peace Research 46 (6): 739–56.
Gaibulloev, Khusrav and Todd Sandler. 2009b. “The Impact of Terrorism and Conflicts on
Growth in Asia.” Economics & Politics 21 (3): 359–83.
Gaibulloev, Khusrav and Todd Sandler. 2011. “The Adverse Effect of Transnational and
Domestic Terrorism on Growth in Africa.” Journal of Peace Research 48 (3): 355–71.
Gaibulloev, Khusrav and Todd Sandler. 2013. “Determinants of the Demise of Terrorist
Organizations.” Southern Economic Journal 79 (4): 774–92.
Gaibulloev, Khusrav and Todd Sandler. 2014. “An Empirical Analysis of Alternative Ways
That Terrorist Groups End.” Public Choice 160 (1–2): 25–44.
Gaibulloev, Khusrav, Todd Sandler, and Charlinda Santifort. 2012. “Assessing the Evolving
Threat of Terrorism.” Global Policy 3 (2): 135–144.
Gaibulloev, Khusrav, Todd Sandler, and Donggyu Sul. 2013. “Common Drivers of
Transnational Terrorism: Principal Component Analysis.” Economic Inquiry 51 (1):
707–21.
Gaibulloev, Khusrav, Todd Sandler, and Donggyu Sul. 2014. “Dynamic Panel Analysis under
82
Cross-Sectional Dependence.” Political Analysis 22 (2): 258–73.
Gardeazabal, Javier and Todd Sandler. 2015. “INTERPOL’s Surveillance Network in Curbing
Transnational Terrorism.” Journal of Policy Analysis and Management 34 (4): 761–80.
Gassebner, Martin, Richard Jong-A-Pin, and Jochen O. Mierau. 2011. “Terroism and Cabinet
Duration.” International Economic Review 52 (4): 1253–70.
Gassebner, Martin and Simon Luechinger. 2011. “Lock, Stock, and Barrel: A Comprehensive
Assessment of the Determinants of Terror.” Public Choice 149 (3–4): 235–61.
George, Justin. 2018. “State Failure and Transnational Terrorism: An Empirical Analysis.”
Journal of Conflict Resolution 62 (3): 471–95.
Gould, Eric D. and Esteban F. Klor. 2010. “Does Terrorism Work?” Quarterly Journal of
Economics 125 (4): 1459–510.
Hegghammer, Thomas. 2013. “Should I Stay or Should I Go? Explaining Variation in Western
Jihadists’ Choice between Domestic and Foreign Fighting.” American Political Science
Review 107 (1): 1–15.
Hoffman, Bruce. 2006. Inside Terrorism, Revised and Expanded Edition. New York:
Columbia University Press.
Iannaccone, Laurence R. 1992. “Sacrifice and Stigma: Reducing Free-Riding in Cults,
Communes, and Other Collectives.” Journal of Political Economy 100 (2): 271–91.
Iannaccone, Laurence R. and Eli Berman. 2006. “Religious Extremism: The Good, the Bad,
and the Deadly.” Public Choice 128 (1–2): 109–29.
Ito, Harumi and Darin Lee. 2005. “Assessing the Impact of the September 11 Terrorist Attacks
on U.S. Airline Demand.” Journal of Economics and Business 57 (1): 79–95.
Jacobson, Daniel and Edward H. Kaplan. 2007. “Suicide Bombings and Targeted Killings in
(Counter-) Terror Games.” Journal of Conflict Resolution 51 (5): 772–92.
83
Jaeger, David A., Esteban F. Klor, Sami H. Miaari, and M. Daniele Paserman. 2012. “The
Struggle for Palestinian Hearts and Minds: Violence and Public Opinion in the Second
Intifada.” Journal of Public Economics 96 (3–4): 354–68.
Jaeger, David A., Esteban F. Klor, Sami H. Miaari, and M. Daniele Paserman. 2015. “Can
Militants Use Violence to Win Public Support? Evidence from the Second Intifada.”
Journal of Conflict Resolution 59 (3): 528–49.
Jaeger, David A. and M. Daniele Paserman. 2008. “The Cycle of Violence? An Empirical
Analysis of Fatalities in the Palestinian-Israeli Conflict.” American Economic Review 98
(4): 1591–1604.
Jaeger, David A. and M. Daniele Paserman. 2009. “The Shape of Things to Come? On the
Dynamics of Suicide Attacks and Targeted Killings.” Quarterly Journal of Political
Science 4 (4): 315–42.
Jaeger, David A. and Zahra Siddique. 2011. “Are Drone Strikes Effective in Afghanistan and
Pakistan? On the Dynamics of Violence between and United States and the Taliban.”
Discussion Paper 6262, The Institute for the Study of Labor (IZA), Bonn, Germany.
Jindapon, Paan and William S. Neilson. 2009. “The Impact of Societal Risk Attitudes on
Terrorism and Counterterrorism.” Economics & Politics 21 (3): 433–51.
Johnston, Patrick B. and Anoop K. Sarbahi. 2016. “The Impact of US Drone Strikes on
Terrorism in Pakistan.” International Studies Quarterly 60 (2): 203–19.
Jones, Seth G. and Martin C. Libicki. 2008. How Terrorist Groups End: Lessons for Countering
al Qa’ida. Santa Monica, CA: RAND.
Kalyvas, Stathis N. and Laia Balcells. 2010. “International System and Technologies of
Rebellion: How the End of the Cold War Shaped Internal Conflict.” American Political
Science Review 104 (3): 415–29.
84
Krueger, Alan B. 2007. What Makes a Terrorist: Economics and the Roots of Terrorism.
Princeton, NJ: Princeton University Press.
Krueger, Alan B. 2008. “What Makes a Homegrown Terrorist? Human Capital and
Participation in Domestic Islamic Terrorist Groups in the USA.” Economics Letters 101
(3): 293–96.
Krueger, Alan B. and David D. Laitin. 2008. “Kto Kogo? A Cross-Country Study of the
Origins and Targets of Terrorism.” In Terrorism, Economic Development and Political
Openness, edited by Philip Keefer and Norman Loayza, 143–73. New York: Cambridge
University Press.
Krueger, Alan B. and Jitka Malečková. 2003. “Education, Poverty, and Terrorism: Is There a
Causal Connection?” Journal of Economic Perspectives 17 (4): 119–44.
Kunreuther, Howard and Geoffrey Heal. 2003. “Interdependent Security.” Journal of Risk and
Uncertainty 26 (2–3): 231–49.
Kunreuther, Howard, Erwann Michel-Kerjan, and Beverly Porter. 2003. “Assessing, Managing
and Financing Extreme Events: Dealing with Terrorism.” Working Paper 10179,
National Bureau of Economic Research, Cambridge, MA.
Kurrild-Klitgaard, Peter, Morgens K. Justesen, and Robert Klemmensen. 2006. “The Political
Economy of Freedom, Democracy, and Transnational Terrorism.” Public Choice 128 (1–
2): 289–315.
Kydd, Andrew and Barbara F. Walter. 2002. “Sabotaging the Peace: The Politics of Extremist
Violence.” International Organization 56 (2): 263–96.
Lai, Brian. 2007. “Draining the Swamp: An Empirical Examination of the Production of
International Terrorism.” Conflict Management and Peace Science 24 (4): 297–310.
Laitin, David D. and Jacob N. Shapiro. 2008. “The Political, Economic, and Organizational
85
Sources of Terrorism.” In Terrorism, Economic Development and Political Openness,
edited by Philip Keefer and Norman Loayza, 209–32. New York: Cambridge University
Press.
Landes, William M. 1978. “An Economic Study of US Aircraft Hijackings, 1961–1976.”
Journal of Law and Economics 21 (1): 1–31.
Lapan, Harvey E. and Todd Sandler. 1988. “To Bargain or Not to Bargain: That Is the
Question.” American Economic Review 78 (2): 16–20.
Lapan, Harvey E. and Todd Sandler. 1993. “Terrorism and Signalling.” European Journal of
Political Economy 9 (3): 383–97.
Li, Quan. 2005. “Does Democracy Promote Transnational Terrorist Incidents?” Journal of
Conflict Resolution 49 (2): 278–97.
Li, Quan and Drew Schaub. 2004. “Economic Globalization and Transnational Terrorism: A
Pooled Time-Series Analysis.” Journal of Conflict Resolution 48 (2): 230–58.
Memon, Nasrullah, Jonathan D. Farley, David L. Hicks, and Torben Rosenørn (eds.). 2009.
Mathematical Methods in Counterterrorism. Wien: Springer-Verlag.
Merari, Ariel. 1993. “Terrorism as a Strategy of Insurgency.” Terrorism and Political Violence
5 (4): 213–51.
Merari, Ariel. 2004. “Suicide Terrorism in the Context of the Israeli-Palestinian Conflict.”
Presentation at the Suicide Terrorism Research Conference, October 25–26, National
Institute of Justice, Washington, DC.
Mickolus, Edward F., Todd Sandler, and Jean M. Murdock. 1989. International Terrorism in
the 1980s: A Chronology of Events, 2 vols. Ames, IA: Iowa State University.
Mickolus, Edward F., Todd Sandler, Jean M. Murdock, and Peter Flemming. 2017.
International Terrorism: Attributes of Terrorist Events, 1968–2016 (ITERATE). Pointe
86
Vedra, FL: Vinyard Software.
Mirza, Daniel and Thierry Verdier. 2014. “Are Lives a Substitute for Livelihoods? Terrorism,
Security, and U.S. Bilateral Imports.” Journal of Conflict Resolution 58 (6): 943–75.
National Consortium for the Study of Terrorism and Responses to Terrorism (START). 2017.
Global Terrorism Database (GTD), CD-ROM. College Park, MD: University of
Maryland. Available at www.start.umd.edu/gtd/ (Accessed November 12, 2017).
Nemeth, Stephen. 2014. “The Effect of Competition on Terrorist Group Operations. Journal of
Conflict Resolution 58 (2): 336–62.
Neumayer, Eric. 2004. “The Impact of Political Violence on Tourism: Dynamic Cross-
National Estimation.” Journal of Conflict Resolution 48 (2): 259–81.
Neumayer, Eric and Thomas Plümper. 2016. “Spatial Spill-overs from Terrorism on Tourism:
Western Victims in Islamic Destination Countries.” Public Choice 169 (3-4): 195–206.
Nitsch, Volker and Dieter Schumacher. 2004. “Terrorism and International Trade: An
Empirical Investigation.” European Journal of Political Economy 20 (2): 423–33.
Overgaard, Per Baltzer. 1994. “The Scale of Terrorist Attacks as a Signal of Resources.”
Journal of Conflict Resolution 38 (3): 452–78.
Pape, Robert A. 2003. “The Strategic Logic of Suicide Terrorism.” American Political Science
Review 97 (3): 343–61.
Pape, Robert A. 2005. Dying to Win: The Strategic Logic of Suicide Terrorism. New York:
Random House.
Phillips, Brian J. 2014. “Terrorist Group Cooperation and Longevity.” International Studies
Quarterly 58 (2): 336–47.
Phillips, Brian J. 2015. “What Is a Terrorist Group? Conceptual Issues and Empirical
Implications.” Terrorism and Political Violence 27 (2): 225–42.
87
Piazza, James A. 2008. “Incubators of Terror: Do Failed and Failing States Promote
Transnational Terrorism?” International Studies Quarterly 52 (3): 469–88.
Piazza, James A. 2011. “Poverty, Minority Economic Discrimination and Domestic Terrorism.”
Journal of Peace Research 48 (3): 339–53.
Pizam, Abraham and Aliza Fleischer. 2002. “Severity versus Frequency of Acts of Terrorism:
Which Has a Larger Impact on Tourism Demand?” Journal of Travel Research 40 (3):
337–9.
Powell, Robert. 2007. “Defending against Terrorist Attacks with Limited Resources.”
American Political Science Review 101 (3): 527–41.
RAND. 2012. Database of Worldwide Terrorism Incidents, available at
http://www.rand.org/nsrd/projects/terrorism-incidents.html (Assessed August 12, 2012).
Rapoport, David C. 2004. “Modern Terror: The Four Waves.” In Attacking Terrorism:
Elements of a Grand Strategy, edited by Audrey Kurth Cronin and James M. Ludes, 46–
73. Washington, DC: Georgetown University Press.
Rohner, Dominic and Bruno S. Frey. 2007. “Blood and Ink! The Common-Interest Game
between Terrorists and the Media.” Public Choice 133 (1–2): 129–45.
Rosendorff, B. Peter and Todd Sandler. 2004. “Too Much of a Good Thing? The Proactive
Response Dilemma.” Journal of Conflict Resolution 48 (5): 657–71.
Rosendorff, B. Peter and Todd Sandler. 2010. “Suicide Terrorism and the Backlash Effect.”
Defence and Peace Economics 21 (5–6): 443–57.
Sageman, Marc. 2004. Understanding Terror Networks. Philadelphia, PA: University of
Pennsylvania Press.
Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century.
Philadelphia, PA: University of Pennsylvania Press.
88
Sambanis, Nicholas. 2008. “Terrorism and Civil War.” In Terrorism, Economic Development
and Political Openness, edited by Philip Keefer and Norman Loayza, 174–206. New
York: Cambridge University Press.
San-Akca, Belgin. 2014. “Democracy and Vulnerability: An Exploitation Theory of
Democracies by Terrorists.” Journal of Conflict Resolution 58 (7): 1285–310.
Sandler, Todd. 1995. “On the Relationship between Democracy and Terrorism.” Terrorism and
Political Violence 7 (4): 1–9.
Sandler, Todd. 2003. “Collective Action and Transnational Terrorism.” World Economy 26 (6):
779–802.
Sandler, Todd. 2005. “Collective versus Unilateral Responses to Terrorism.” Public Choice
124 (1–2): 75–93.
Sandler, Todd. 2010. “Terrorism Shocks: Domestic versus Transnational Responses.” Studies
in Conflict & Terrorism 33 (10): 893–910.
Sandler, Todd and Daniel G. Arce. 2003. “Terrorism & Game Theory.” Simulation & Gaming
34 (3): 319–37.
Sandler, Todd, Daniel G. Arce, and Walter Enders. 2009. “Transnational Terrorism.” In Global
Crises, Global Solutions, 2nd ed., edited by Bjørn Lomborg, 516–62. Cambridge:
Cambridge University Press.
Sandler, Todd, Daniel G. Arce, and Walter Enders. 2011. “An Evaluation of INTERPOL’s
Cooperative-Based Counterterrorism Linkage.” Journal of Law and Economics 54 (1):
79–110.
Sandler, Todd and Keith Hartley. 1995. The Economics of Defense. Cambridge: Cambridge
University Press.
Sandler, Todd and Harvey E. Lapan. 1988. “The Calculus of Dissent: An Analysis of
89
Terrorists’ Choice of Targets.” Synthese 76 (2): 245–61.
Sandler, Todd and Kevin Siqueira. 2006. “Global Terrorism: Deterrence versus Preemption.”
Canadian Journal of Economics 50 (4): 1370–87.
Sandler, Todd and Kevin Siqueira. 2009. “Games and Terrorism: Recent Developments.”
Simulation & Gaming 40 (2): 164–92.
Sandler, Todd, John Tschirhart, and Jon Cauley. 1983. “A Theoretical Analysis of
Transnational Terrorism.” American Political Science Review 77 (1): 36–54.
Santifort, Charlinda and Todd Sandler. 2013. “Terrorist Success in Hostage-Taking Missions:
1978–2010.” Public Choice 156 (1–2): 125–37.
Santifort-Jordan, Charlinda and Todd Sandler. 2014. “An Empirical Study of Suicide
Terrorism: A Global Analysis.” Southern Economic Journal 80 (4): 981–1001.
Savun, Burcu and Brian J. Phillips. 2009. “Democracy, Foreign Policy, and Terrorism.”
Journal of Conflict Resolution 53 (6): 878–904.
Schneider, Friedrich, Tilman Brück, and Daniel Meierrieks. 2015. “The Economics of
Counterterrorism: A Survey.” Journal of Economic Surveys 29 (1): 131–57.
Selten, Reinhard. 1977. “A Simple Game Model of Kidnappings.” In Mathematical Economics
and Game Theory: Essays in Honor of Oskar Morgenstern, edited by R. Henn and O.
Moeschlin, 139–55. Berlin: Springer-Verlag.
Shapiro, Jacob N. 2007. “Terrorist Organizations’ Vulnerabilities and Inefficiencies.” In
Terrorism Financing and State Responses: A Comparative Perspective, edited by Jeanne
K. Giraldo and Harold A. Trinkunas, 308–13. Stanford, CA: Stanford University Press.
Shapiro, Jacob N. 2013. The Terrorist’s Dilemma: Managing Violent Covert Organizations.
Princeton, NJ: Princeton University Press.
Shapiro, Jacob N. and David A. Siegel. 2007. “Underfunding in Terrorist Organizations.”
90
International Studies Quarterly 51 (2): 405–29.
Siqueira, Kevin. 2005. “Political and Militant Wings within Dissident Movements and
Organizations.” Journal of Conflict Resolution 49 (2): 218–36.
Siqueira, Kevin and Todd Sandler. 2006. “Terrorists versus the Government: Strategic
Interaction, Support, and Sponsorship.” Journal of Conflict Resolution 50 (6): 878–98.
Siqueira, Kevin and Todd Sandler. 2007. “Terrorist Backlash, Terrorism Mitigation, and Policy
Delegation.” Journal of Public Economics 91 (9): 1800–15.
Siqueira, Kevin and Todd Sandler. 2010. “Terrorist Networks, Support, and Delegation.”
Public Choice 142 (1–2): 237–53.
Sloboda, Brian W. 2003. “Assessing the Effects of Terrorism on Tourism by the Use of Time
Series Methods.” Tourism Economics 9 (2): 179–90.
Tavares, Jose. 2004. “The Open Society Assesses its Enemies: Shocks, Disasters and Terrorist
Attacks.” Journal of Monetary Economics 51 (5): 1039–70.
Viscusi, W. Kip and Richard J. Zeckhauser. 2003. “Sacrificing Civil Liberties to Reduce
Terrorism Risks.” Journal of Risk and Uncertainty 26 (2–3): 99–120.
Wilkinson, Paul. 2001. Terrorism versus Democracy: The Liberal State Response. London:
Frank Cass.
Wintrobe, Ronald. 2006. “Extremism, Suicide Terror, and Authoritarianism.” Public Choice
128 (1): 169–95.
Young, Joseph K. and Michael G. Findley. 2011. “Can Peace Be Purchased? A Sectoral-Level
Analysis of Aid’s Influence on Transnational Terrorism.” Public Choice 149 (3–4): 365–
81.
Zhuang, Jun and Vicki M. Bier. 2007. “Balancing Terrorism and Natural Disasters – Defensive
Strategy with Endogenous Attacker Effort.” Operations Research 55 (5): 976–91.
91
Zussman, Asaf and Noam Zussman. 2006. “Assassinations: Evaluating the Effectiveness of an
Israeli Counterterrorism Policy Using Stock Market Data.” Journal of Economic
Perspectives 20 (2): 193–206.
TABLE 1
DISTRIBUTION OF TERRORIST GROUPS BY IDEOLOGY AND BASE COUNTRY OF OPERATION’S CHARACTERISTICS: BEFORE AND AFTER 2001
Ideology Average Number Number
Base country’s economy Base country’s regime type
Low IncomeMiddle Income High Income Not Free Partly Free Free
Groups started before 2001
Left Wing 5.3 198 (38) 26 (21) 102 (43) 69 (44) 21 (20) 64 (39) 113 (45)
Nationalist 4.9 192 (37) 56 (46) 78 (33) 58 (37) 44 (42) 60 (37) 88 (35)
Religious 2.6 90 (17) 35 (29) 47 (20) 8 (5) 36 (34) 34 (21) 20 (8)
Right Wing 1.1 38 (7) 4 (3) 13 (5) 21 (13) 5 (5) 5 (3) 28 (11)
Total 13.9 518 (100) 121 (100) 240 (100) 156 (100) 106 (100) 163 (100) 249 (100)
Groups started during 2001–2006
Left Wing 6.0 36 (28) 2 (9) 18 (23) 16 (57) 0 (0) 13 (35) 23 (52)
Nationalist 6.3 38 (29) 6 (27) 25 (31) 7 (25) 11 (22) 13 (35) 14 (32)
Religious 8.7 52 (40) 14 (64) 34 (43) 4 (14) 38 (78) 9 (24) 5 (11)
Right Wing 0.7 4 (3) 0 (0) 3 (4) 1 (4) 0 (0) 2 (5) 2 (5)
Total 21.7 130 (100) 22 (100) 80 (100) 28 (100) 49 (100) 37 (100) 44 (100) Notes: All data come from Jones and Libicki (2008). Numbers in parentheses are percentages; e.g., out of 518 groups started before 2001, 38% are left wing. The average annual number of groups for pre-2001 period is computed using number of groups that started during 1968–2001 and dividing by 34. Therefore, we exclude 47 groups that started sometime before 1968 in the average column calculation.
TABLE 2 REGIONAL DISTRIBUTION OF TERRORIST GROUPS BY IDEOLOGY: BEFORE AND AFTER 2002
Ideology EAP ECA LAC MENA NA SA SSA Total
Groups started before 2002
Left Wing 13 73 75 12 10 6 10 199
Nationalist 12 69 6 49 11 38 21 206
Religious 16 10 1 34 4 24 7 96
Right Wing 2 9 10 0 2 0 3 26
Total 43 161 92 95 27 68 41 527
Groups started during 2002–2006
Left Wing 1 12 13 0 1 2 0 29
Nationalist 2 12 0 12 0 5 1 32
Religious 0 3 0 28 0 10 0 41
Right Wing 1 0 1 0 0 0 1 3
Total 4 27 14 40 1 17 2 105 Notes: Terrorist group data come from Jones and Libicki (2008). Regions are defined following World Bank classification: South Asia, SA; Europe and Central Asia, ECA; Middle East and North Africa, MENA; Latin America and the Caribbean, LAC; East Asia and Pacific, EAP; sub-Saharan Africa, SSA; and North America, NA. There are 586 terrorist groups but the total number of observations is 633; some groups have multiple bases of operation in different regions.
TABLE 3 DISTRIBUTION OF TERRORIST INCIDENTS BY GROUP IDEOLOGY: 2002–2007
Ideology Number of
groups
Number of groups ended by
2007 Number of incidents
Number of casualties
Number of incidents per
group
Number of casualties per
group
Left Wing 29 13 322 919 11.1 31.7
Nationalist 30 13 124 2415 4.1 80.5
Religious 41 12 216 3482 5.3 84.9
Right Wing 3 2 12 11 4.0 3.7
Total 103 40 674 6827 6.5 68.3 Notes: Terrorist group data come from Jones and Libicki (2008). Data on terrorist (both transnational and domestic) incidents come from RAND (2012).
TABLE 4 DISTRIBUTION OF TRANSNATIONAL INCIDENTS AND CASUALTIES BY TYPE OF
ATTACKS
Bombing Hostage Armed attack Assassination Others Total
Number of incidents
1968–2001 5506 1772 1462 1049 2388 12177
2002–2016 849 590 628 197 213 2477
Average number of incidents per year
1968–2001 161.9 52.1 43.0 30.9 70.2 358
2002–2016 56.6 39.3 41.9 13.1 14.2 165
Number of casualties
1968–2001 21103 3581 5600 1877 387 32548
2002–2016 18367 2464 5495 849 197 27372
Average number of casualties per year
1968–2001 620.7 105.3 164.7 55.2 11.4 957
2002–2016 1224.5 164.3 366.3 56.6 13.1 1825
TABLE 5
DISTRIBUTION OF DOMESTIC INCIDENTS AND CASUALTIES BY TYPE OF ATTACKS
Bombing Hostage Armed attack Assassination Others Total
Number of incidents
1970–2001 19942 210 8273 7365 4769 40559
2002–2016 31715 4326 13342 4558 3737 57678
Average number of incidents per year
1970–2001 623.2 6.6 258.5 230.2 149.0 1267
2002–2016 2114.3 288.4 889.5 303.9 249.1 3845
Number of casualties
1970–2001 79728.0 503 50262 13092 12413.0 155998
2002–2016 255581.9 17530.5 69959.3 11830.2 6803.8 361706
Average number of casualties per year
1970–2001 2491.5 15.7 1570.7 409.1 387.9 4875
2002–2016 17038.8 1168.7 4664.0 788.7 453.6 24114
Figure 1. Number of Transnational and Domestic Terrorist Incidents
0
2000
4000
6000
8000
10000
12000
14000
0
100
200
300
400
500
600
700
1968 1972 1976 1980 1984 1988 1992 1996 2000 2004 2008 2012 2016
Nu
mb
er o
f d
omes
tic
inci
den
ts
Nu
mb
er o
f tr
ansn
atio
nal
inci
den
tsTransnational Domestic
Figure 2. Number of Casualties per Incident
0.0
2.0
4.0
6.0
8.0
10.0
12.0
14.0
16.0
18.0
20.0
1968 1972 1976 1980 1984 1988 1992 1996 2000 2004 2008 2012 2016
Cas
ual
ties
per
inci
den
tTransnational Domestic
Figure 3. Proportion of Transnational and Domestic Terrorist Events with Casualties
0
10
20
30
40
50
60
70
80
90
1968 1972 1976 1980 1984 1988 1992 1996 2000 2004 2008 2012 2016
Per
cen
tage
Transnational Domestic
Figure 4. Number and Percentage of Transnational Attacks against US Interests per Year
0.0
10.0
20.0
30.0
40.0
50.0
60.0
70.0
80.0
90.0
0
50
100
150
200
250
300
1968 1972 1976 1980 1984 1988 1992 1996 2000 2004 2008 2012 2016
Per
cen
tage
Nu
mb
er o
f in
cid
ents
Number of incidents Percentage of incidents
Figure 5. Distribution of Transnational Incidents by Type of Attacks for 1968–2001 and 2002–2016
0.00
5.00
10.00
15.00
20.00
25.00
30.00
35.00
40.00
45.00
50.00
Bombing Hostage Armed Attack Assassination
Per
cen
tage
1968-2001
2002-2016
Figure 6. Distribution of Domestic Incidents by Type of Attacks for 1970–2001 and 2002–2016
0.00
10.00
20.00
30.00
40.00
50.00
60.00
Bombing Hostage Armed Attack Assassination
Per
cen
tage
1970-2001
2002-2016
Figure 7a. Distribution of Transnational Incidents by Regions for 1968–2001
Figure 7b. Distribution of Transnational Incidents by Regions for 2002–2016
EAP8%
ECA37%
LAC21%
MENA17%
NA6%
SA4% SSA
7%
1968-2001
EAP5%
ECA13%
LAC3%
MENA35%
NA1%
SA20%
SSA23%
2002-2016
Figure 8a. Distribution of Domestic Incidents by Regions for 1970–2001
Figure 8b. Distribution of Domestic Incidents by Regions for 2002–2016
EAP6%
ECA21%
LAC42%
MENA9%
NA2%
SA13%
SSA7%
1970-2001
EAP8%
ECA6%
LAC2%
MENA37%
NA1%
SA35%
SSA11%
2002-2016
Figure 9a. Distribution of Transnational Incident Casualties by Regions for 1968–2001
Figure 9b. Distribution of Transnational Incident Casualties by Regions for 2002–2016
EAP8%
ECA30%
LAC10%
MENA31%
NA3%
SA8%
SSA10%
1968-2001
EAP8%
ECA18%
LAC1%
MENA38%
NA1%
SA17%
SSA17%
2002-2016
Figure 10a. Distribution of Domestic Incident Casualties by Regions for 1970–2001
Figure 10b. Distribution of Domestic Incident Casualties by Regions for 2002–2016
EAP8%
ECA12%
LAC21%
MENA16%
NA1%
SA29%
SSA13%
1970-2001
EAP4%
ECA4%
LAC1%
MENA50%
NA0%
SA28%
SSA13%
2002-2016